Analysis Overview
SHA256
a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46
Threat Level: Shows suspicious behavior
The file a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N was found to be: Shows suspicious behavior.
Malicious Activity Summary
ACProtect 1.3x - 1.4x DLL software
Loads dropped DLL
UPX packed file
Suspicious use of SetThreadContext
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Unsigned PE
Modifies registry class
Modifies Internet Explorer settings
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-10 01:37
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-10 01:37
Reported
2024-11-10 01:39
Platform
win7-20240903-en
Max time kernel
119s
Max time network
17s
Command Line
Signatures
ACProtect 1.3x - 1.4x DLL software
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Loads dropped DLL
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1664 set thread context of 2528 | N/A | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\ProgID\ = "a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.DynamicNS" | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\LocalServer32 | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.DynamicNS\Clsid | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.DynamicNS\Clsid\ = "{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}" | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.DynamicNS | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.DynamicNS\ = "DynamicNS" | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\ProgID | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80} | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\ = "DynamicNS" | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe" | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
"C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe"
C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
"C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe"
Network
Files
memory/1664-0-0x00000000001E0000-0x00000000001E1000-memory.dmp
memory/2528-6-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-7-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-20-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-21-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/1664-22-0x0000000000400000-0x00000000007F0000-memory.dmp
memory/2528-19-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-23-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-18-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-17-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-15-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/2528-13-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-11-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-3-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-9-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-1-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-113-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-112-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-111-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-110-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-109-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-108-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-107-0x0000000003F60000-0x0000000003FBB000-memory.dmp
\Users\Admin\AppData\Local\Temp\{0EA92B5B-70BF-45FB-95D0-1A43F007C70E}.dll
| MD5 | c9f333d1ff898672a34805f94a265329 |
| SHA1 | 2deaac66698fb2e9b3868d23034c3211c508b739 |
| SHA256 | 07e546811635574c77edfda126b0e5f5292b4ea13f35158eddedcfc3cbf74b6b |
| SHA512 | 048c71e48e2def0bfc69ebfb69b834d650a9377082782333f50728fdfd6675df8093d0c87e606022e55d09f81549d4ca3b640bcdd33b9ddc9aace03ee1466add |
memory/2528-96-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-83-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-79-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-75-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-71-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-70-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-67-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-57-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-55-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-49-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-47-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-41-0x0000000003F60000-0x0000000003FBB000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\isDB23.tmp
| MD5 | 778ec2605d321a00f97abe22b2c543c9 |
| SHA1 | 9755525dc45b0f68cf8927b455105fd4021f31c3 |
| SHA256 | be44028a67f9186034a7753e23087cae8b619af7d86bb4d43e84904a17d235cd |
| SHA512 | b6135a31a3e8d92e9ca04540055fab00fb9e086cbca6a1b423a62a464eb0cf8f73205115c05ab64c7ad5379391e987cf88a65954e199a0ab7b20e665fd35c3b3 |
memory/2528-36-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-32-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-123-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-172-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-203-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-201-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-198-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-196-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-193-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-189-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-186-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-184-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-180-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-176-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-168-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-167-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-163-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-159-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-152-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-151-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-147-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-143-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-139-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-136-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-131-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-216-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-215-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-214-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-217-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-218-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-219-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-220-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-221-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-222-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-223-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-224-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-225-0x0000000003F60000-0x0000000003FBB000-memory.dmp
memory/2528-226-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-227-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-228-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-233-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-264-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-263-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-262-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-261-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-260-0x0000000005990000-0x00000000059EB000-memory.dmp
memory/2528-258-0x0000000005990000-0x00000000059EB000-memory.dmp
memory/2528-254-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-250-0x0000000005990000-0x00000000059EB000-memory.dmp
memory/2528-247-0x0000000005990000-0x00000000059EB000-memory.dmp
memory/2528-245-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-241-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-237-0x0000000005990000-0x00000000059EB000-memory.dmp
memory/2528-308-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-309-0x0000000005990000-0x00000000059EB000-memory.dmp
memory/2528-310-0x0000000005990000-0x00000000059EB000-memory.dmp
memory/2528-311-0x0000000005990000-0x00000000059EB000-memory.dmp
memory/2528-312-0x0000000005990000-0x00000000059EB000-memory.dmp
memory/2528-314-0x0000000005990000-0x00000000059EB000-memory.dmp
memory/2528-313-0x0000000005990000-0x00000000059EB000-memory.dmp
memory/2528-315-0x0000000005990000-0x00000000059EB000-memory.dmp
memory/2528-316-0x0000000005990000-0x00000000059EB000-memory.dmp
memory/2528-317-0x0000000005990000-0x00000000059EB000-memory.dmp
memory/2528-318-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-319-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-320-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-321-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-322-0x0000000005940000-0x000000000599B000-memory.dmp
memory/2528-344-0x0000000005990000-0x00000000059EB000-memory.dmp
memory/2528-341-0x0000000005990000-0x00000000059EB000-memory.dmp
memory/2528-338-0x0000000005990000-0x00000000059EB000-memory.dmp
memory/2528-335-0x0000000005990000-0x00000000059EB000-memory.dmp
memory/2528-333-0x0000000005990000-0x00000000059EB000-memory.dmp
memory/2528-330-0x0000000005990000-0x00000000059EB000-memory.dmp
memory/2528-326-0x0000000005990000-0x00000000059EB000-memory.dmp
memory/2528-407-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-568-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-647-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-804-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-877-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-1036-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-1148-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-1212-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-1305-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/2528-1398-0x0000000000400000-0x00000000005BE000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-10 01:37
Reported
2024-11-10 01:39
Platform
win10v2004-20241007-en
Max time kernel
113s
Max time network
98s
Command Line
Signatures
ACProtect 1.3x - 1.4x DLL software
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Loads dropped DLL
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 4548 set thread context of 1104 | N/A | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\ = "DynamicNS" | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe" | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.DynamicNS\Clsid\ = "{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}" | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80} | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\LocalServer32 | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.DynamicNS | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.DynamicNS\ = "DynamicNS" | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.DynamicNS\Clsid | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\ProgID | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\ProgID\ = "a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.DynamicNS" | C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe | N/A |
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
"C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe"
C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
"C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 74.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 53.210.109.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 98.117.19.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
Files
memory/4548-0-0x0000000000AF0000-0x0000000000AF1000-memory.dmp
memory/1104-2-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/1104-1-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/1104-3-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/1104-4-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/1104-5-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/4548-6-0x0000000000400000-0x00000000007F0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\{A9489A60-59D2-4699-AB5A-F2F76CF5FDD8}.dll
| MD5 | c9f333d1ff898672a34805f94a265329 |
| SHA1 | 2deaac66698fb2e9b3868d23034c3211c508b739 |
| SHA256 | 07e546811635574c77edfda126b0e5f5292b4ea13f35158eddedcfc3cbf74b6b |
| SHA512 | 048c71e48e2def0bfc69ebfb69b834d650a9377082782333f50728fdfd6675df8093d0c87e606022e55d09f81549d4ca3b640bcdd33b9ddc9aace03ee1466add |
memory/1104-15-0x0000000005510000-0x000000000556B000-memory.dmp
memory/1104-14-0x0000000005510000-0x000000000556B000-memory.dmp
memory/1104-57-0x0000000005510000-0x000000000556B000-memory.dmp
memory/1104-139-0x0000000005510000-0x000000000556B000-memory.dmp
memory/1104-91-0x0000000005510000-0x000000000556B000-memory.dmp
memory/1104-85-0x0000000005510000-0x000000000556B000-memory.dmp
memory/1104-79-0x0000000005510000-0x000000000556B000-memory.dmp
memory/1104-74-0x0000000005510000-0x000000000556B000-memory.dmp
memory/1104-72-0x0000000005510000-0x000000000556B000-memory.dmp
memory/1104-67-0x0000000005510000-0x000000000556B000-memory.dmp
memory/1104-65-0x0000000005510000-0x000000000556B000-memory.dmp
memory/1104-59-0x0000000005510000-0x000000000556B000-memory.dmp
memory/1104-52-0x0000000005510000-0x000000000556B000-memory.dmp
memory/1104-138-0x0000000005510000-0x000000000556B000-memory.dmp
memory/1104-47-0x0000000005510000-0x000000000556B000-memory.dmp
memory/1104-45-0x0000000005510000-0x000000000556B000-memory.dmp
memory/1104-39-0x0000000005510000-0x000000000556B000-memory.dmp
memory/1104-34-0x0000000005510000-0x000000000556B000-memory.dmp
memory/1104-32-0x0000000005510000-0x000000000556B000-memory.dmp
memory/1104-27-0x0000000005510000-0x000000000556B000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\isB834.tmp
| MD5 | 778ec2605d321a00f97abe22b2c543c9 |
| SHA1 | 9755525dc45b0f68cf8927b455105fd4021f31c3 |
| SHA256 | be44028a67f9186034a7753e23087cae8b619af7d86bb4d43e84904a17d235cd |
| SHA512 | b6135a31a3e8d92e9ca04540055fab00fb9e086cbca6a1b423a62a464eb0cf8f73205115c05ab64c7ad5379391e987cf88a65954e199a0ab7b20e665fd35c3b3 |
memory/1104-140-0x0000000000400000-0x00000000005BE000-memory.dmp
memory/1104-141-0x0000000000400000-0x00000000005BE000-memory.dmp