Overview
overview
10Static
static
7066d06ca00...81.exe
windows7-x64
1006d6f22d02...bc.exe
windows7-x64
809f1d49065...d1.exe
windows7-x64
10208cca124d...45.exe
windows7-x64
10241f67ece2...79.exe
windows7-x64
130616f6c48...60.exe
windows7-x64
1044f28cd6ea...7e.exe
windows7-x64
34b190a407b...5f.exe
windows7-x64
1072ddceebe7...6b.exe
windows7-x64
97b53a00b3a...b2.exe
windows7-x64
77cf39ebb44...57.exe
windows7-x64
108c42a08427...51.exe
windows7-x64
79d081b734c...91.exe
windows7-x64
4b25cc31472...15.exe
windows7-x64
10b2ec72de35...8f.exe
windows7-x64
6b4c2ffccfe...dd.exe
windows7-x64
5bab7af3306...be.exe
windows7-x64
9c531015ec0...86.exe
windows7-x64
8dc7ab2e7ed...60.exe
windows7-x64
8debfd1fb34...d8.exe
windows7-x64
8df36e2aaae...37.exe
windows7-x64
9df99316e57...27.exe
windows7-x64
4e60fc4473a...60.exe
windows7-x64
10Analysis
-
max time kernel
841s -
max time network
844s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-11-2024 19:27
Behavioral task
behavioral1
Sample
066d06ca007d19457ca609dd95975f7facb551ffb5d8f6d4edf108236ad8c981.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
06d6f22d02443afd6d6880ead6648ebc.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
09f1d49065108a595578ff86ff63a514d47d5496ab5c23f38cda1f0d57dd6cd1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
208cca124ddafe35a122f6bdd36191151a2730b4e1051804d5f68d0cb4b44145.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
241f67ece26c9e6047bb1a9fc60bf7c45a23ea1a2bb08a1617a385c71d008d79.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
30616f6c488fa16ccdcbfd6273e7ac8604c82bc1468fc1a70b2a43661b674760.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
44f28cd6ea894c05030ab913e2a0f1f1596b4aa7c551df9381f521cb88a92f7e.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
4b190a407bca89dd4778afa551bdc58dddff26fc5fe7622453e836ecdfaf565f.exe
Resource
win7-20240729-en
Behavioral task
behavioral9
Sample
72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
7b53a00b3a8859755f6144cb2149673fa17fdd6e439cbfdee21a7a513e6395b2.exe
Resource
win7-20241023-en
Behavioral task
behavioral11
Sample
7cf39ebb4409b13a7c153abff6661cc4d28d8d7109543d6419438ac9f2f1be57.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
8c42a084278ff8e25f7ee765c37da84da02780da725505108f9eb39cfb05c051.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
9d081b734c595a1ae38e254369c0060c5870ee119c9f7853989c23ebc204a291.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
b2ec72de3543060f0f3af322c4f1caf2d65fa8ff56b5a93a5e8fa59c191d178f.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
bab7af3306f66d5deaafda1f0cd57c20e42678451a7bc70c71255f6a7e1806be.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
c531015ec09adf346131a375df9b9d04c90657fac9b80f2b1e269dae6186de86.exe
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
dc7ab2e7ed26554a11da51a184e95b01e685b1a2f99c7fc77d54d5966530bf60.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
df36e2aaae85f07851810a829e38a82827252fda15d4c4410da085d59ce38737.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
df99316e57002298d88be785acad4c3a900cbc5e04a29e32d4549f25f08a7527.exe
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
e60fc4473ada26f3a8d2dd5c5f226441073bf86737e271f6f2ec61324ef9ab60.exe
Resource
win7-20241010-en
General
-
Target
debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe
-
Size
1.8MB
-
MD5
84b51ee1b45d26e08c525d9c87a4945a
-
SHA1
04d9559bb0ed6e964b05d1583a7410eca837f1cf
-
SHA256
debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8
-
SHA512
d3a4c07119ce03d1199ed2e6fb98b1504c171fe1d8ce1d71c33e2f2562ad0149e4fd5018ae837d9500761ad3d73f30c48d8c44d72438b048c8fd5f914d3549c9
-
SSDEEP
24576:sVLOUsdmcKn0RVIC0GN9eyS7QPkIIgmWmQL3taRHLM36T22CKRJqNE4u6FOcnDs7:stJ6F7PN3taRHwe3clnBowQg7K
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Port Monitors 1 TTPs 5 IoCs
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
Processes:
spoolsv.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Microsoft Shared Fax Monitor spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Local Port spoolsv.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exedescription ioc process File opened (read-only) \??\P: debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe File opened (read-only) \??\R: debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe File opened (read-only) \??\S: debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe File opened (read-only) \??\T: debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe File opened (read-only) \??\K: debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe File opened (read-only) \??\N: debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe File opened (read-only) \??\O: debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe File opened (read-only) \??\Q: debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe File opened (read-only) \??\V: debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe File opened (read-only) \??\W: debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe File opened (read-only) \??\X: debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe File opened (read-only) \??\Z: debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe File opened (read-only) \??\H: debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe File opened (read-only) \??\L: debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe File opened (read-only) \??\M: debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe File opened (read-only) \??\J: debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe File opened (read-only) \??\U: debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe File opened (read-only) \??\Y: debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe File opened (read-only) \??\E: debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe File opened (read-only) \??\G: debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe File opened (read-only) \??\I: debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
net.exetcpsvcs.exenet.exedebfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.execmd.exenet1.exeIEXPLORE.EXEnet1.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tcpsvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBIOSDate debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5AE0E5C1-A12C-11EF-BA5A-5EE01BAFE073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000656f10714a87ee59ad8453549ce426fc4e442394b742c13d4800945487a5d732000000000e800000000200002000000000bd08c485fce3f86733e22e21131db64d3d6ea0108967e02aab1ffa77104c7f20000000d1f4a54eb55e41a42b4b6aa8fc2544a5002755b07fb6ae15e7b322ba722a994440000000a523ac8c548cb1182be132780f27805b4c18850c5243ee559408289fa26477abd251ed0f8f77bc8975bb555f2e38776302f9ed1d5484398437ea1dac9dcfe841 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e8324a3935db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "437601602" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Modifies data under HKEY_USERS 14 IoCs
Processes:
spoolsv.exedescription ioc process Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne01:,15,45" spoolsv.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne01:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne01:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne01:" spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" spoolsv.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exepid process 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
tcpsvcs.exepid process 2644 tcpsvcs.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
spoolsv.exedescription pid process Token: SeRestorePrivilege 564 spoolsv.exe Token: SeRestorePrivilege 564 spoolsv.exe Token: SeRestorePrivilege 564 spoolsv.exe Token: SeRestorePrivilege 564 spoolsv.exe Token: SeRestorePrivilege 564 spoolsv.exe Token: SeRestorePrivilege 564 spoolsv.exe Token: SeRestorePrivilege 564 spoolsv.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3004 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exeiexplore.exeIEXPLORE.EXEpid process 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe 3004 iexplore.exe 3004 iexplore.exe 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.execmd.exenet.execmd.exenet.exeiexplore.exedescription pid process target process PID 1820 wrote to memory of 2520 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe cmd.exe PID 1820 wrote to memory of 2520 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe cmd.exe PID 1820 wrote to memory of 2520 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe cmd.exe PID 1820 wrote to memory of 2520 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe cmd.exe PID 2520 wrote to memory of 2784 2520 cmd.exe net.exe PID 2520 wrote to memory of 2784 2520 cmd.exe net.exe PID 2520 wrote to memory of 2784 2520 cmd.exe net.exe PID 2520 wrote to memory of 2784 2520 cmd.exe net.exe PID 2784 wrote to memory of 2936 2784 net.exe net1.exe PID 2784 wrote to memory of 2936 2784 net.exe net1.exe PID 2784 wrote to memory of 2936 2784 net.exe net1.exe PID 2784 wrote to memory of 2936 2784 net.exe net1.exe PID 1820 wrote to memory of 2644 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe tcpsvcs.exe PID 1820 wrote to memory of 2644 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe tcpsvcs.exe PID 1820 wrote to memory of 2644 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe tcpsvcs.exe PID 1820 wrote to memory of 2644 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe tcpsvcs.exe PID 1820 wrote to memory of 2644 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe tcpsvcs.exe PID 1820 wrote to memory of 2644 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe tcpsvcs.exe PID 1820 wrote to memory of 2644 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe tcpsvcs.exe PID 1820 wrote to memory of 2644 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe tcpsvcs.exe PID 1820 wrote to memory of 2644 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe tcpsvcs.exe PID 1820 wrote to memory of 2644 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe tcpsvcs.exe PID 1820 wrote to memory of 2644 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe tcpsvcs.exe PID 1820 wrote to memory of 2644 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe tcpsvcs.exe PID 1820 wrote to memory of 2644 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe tcpsvcs.exe PID 1820 wrote to memory of 652 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe cmd.exe PID 1820 wrote to memory of 652 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe cmd.exe PID 1820 wrote to memory of 652 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe cmd.exe PID 1820 wrote to memory of 652 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe cmd.exe PID 1820 wrote to memory of 3004 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe iexplore.exe PID 1820 wrote to memory of 3004 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe iexplore.exe PID 1820 wrote to memory of 3004 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe iexplore.exe PID 1820 wrote to memory of 3004 1820 debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe iexplore.exe PID 652 wrote to memory of 3048 652 cmd.exe net.exe PID 652 wrote to memory of 3048 652 cmd.exe net.exe PID 652 wrote to memory of 3048 652 cmd.exe net.exe PID 652 wrote to memory of 3048 652 cmd.exe net.exe PID 3048 wrote to memory of 2944 3048 net.exe net1.exe PID 3048 wrote to memory of 2944 3048 net.exe net1.exe PID 3048 wrote to memory of 2944 3048 net.exe net1.exe PID 3048 wrote to memory of 2944 3048 net.exe net1.exe PID 3004 wrote to memory of 1664 3004 iexplore.exe IEXPLORE.EXE PID 3004 wrote to memory of 1664 3004 iexplore.exe IEXPLORE.EXE PID 3004 wrote to memory of 1664 3004 iexplore.exe IEXPLORE.EXE PID 3004 wrote to memory of 1664 3004 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe"C:\Users\Admin\AppData\Local\Temp\debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe"1⤵
- Checks BIOS information in registry
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop Spooler2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\net.exenet stop Spooler3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Spooler4⤵
- System Location Discovery: System Language Discovery
PID:2936
-
-
-
-
C:\Windows\SysWOW64\tcpsvcs.exe"C:\Users\Admin\AppData\Local\Temp\debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d82.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:2644
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net start Spooler2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\net.exenet start Spooler3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start Spooler4⤵
- System Location Discovery: System Language Discovery
PID:2944
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://blog.sina.com.cn/lanyezi7252⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3004 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1664
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding1⤵PID:2540
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
- Boot or Logon Autostart Execution: Port Monitors
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9bd857dfd109e37bae3be5401227487
SHA1fa99035d4d9a6019c864dd3b2d6dfdceef0df1fe
SHA2565bef4342bde33808a9680ae5d7f84f47a8e77a5b7e3719ecec551a6c577e2120
SHA51298ba68f1486b38367a67d5c98172c35dab50c4327cf79392b69f16520a8f9135d06295f207968f218dcc9b21d246256f5d407adc8ed7ccc41eeb7fd0ffc14591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d833e90876c7df25ea18b4e200e8f527
SHA1db22a324b88631deac503aaa2acfdbbd95bb7a7a
SHA256f45dc197382cdc1e0c970414a38ba963ac51dacead28c0c05c87170a3eeea26c
SHA5125a964addfc8d9f6c9f1033de63562bf906af051d51d28c3ba5949acec4d7d0f986cc75c3914600aa4c8c35578a85370b96d47886e0c83db483e81a28b906f208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575eeda0e1409653e16202bfba2b5d56d
SHA168542c0bc41e264079a50cb8ed38f07c336fdb53
SHA25671eb37b591aef5578dc7e8d94f4146dca01aab1aeeec892b4d65c102a1d2933e
SHA5120c59e76f9fdf165c0baf2ee26b8268ebf1f30971c9ad4bca46aa9fac1a66780ab3fe82b019015357b696742edbd71610a057e66f024573430fccea7e3346095e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5337954bcdf19844d517e7d2a00f6e1b6
SHA16998101219356d247721b835c6c0a5db254e2fbe
SHA256cb1c12160850ee918b46998af67828840856ea3303b18344fe3fe1ee90a71ab6
SHA5128dcd3a9555f83c71c7935859fa22c1efd82589492a4f28f5866e87a4cfe65950060ba01a772373b35f428bc4410afd2ef06a2dc7369eb47aaa5bc5f261667b9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e96257c4def91e9e15ac3816387c96f8
SHA17e3d51b44a7e2541929597dd526b3b9b5d11699b
SHA25608e55193ef10d8f735d3113af9bd41449de283488781b57bff9adbb4c0b22433
SHA512a0bd4650a430e7d84f873c62c83777a619ff53194c057dc1d24b3ed5c9846b87cc5b5a67706cd227e5f510e1ee3c2f6ce7b34e2b6aeafd4eec5d52233084f73d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b8078af527855ef5c5caca4f73c9e13
SHA1fa93389ead56e0a2caed0947b53260826401c245
SHA2561f12498dd90c4284564692bcd7876df5a5218bde23ab2242b844d167646d97dc
SHA5126ac05e3ce46fd8bb7e835cfd59d0c3c1cfb8fa77f08f9b7478ae19969f43484017cee132ad24f10340e08fce5f736d527b8f7a6b2b3a2a0a790d7802763d5f88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5097e3688c0fc8eddbb62bbceb5710a3b
SHA1786f1980cc8de94d1391aee00231ebbfc888dda1
SHA2562b4d7dbd956d059d809e36f749579f95925067c2e7859a4bc1ec8001681c9fc2
SHA512330c89097709541daab27bc0ecc4b17bc36995fc4be372b3a9a780f42174fe536dda9b611fca9ce835fc498cbe1ead3fb9a31841377c1873f738bdeaf18f4014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51334fa81be272db0fd2e1b67537092a5
SHA10b80d3b4a9ec94bb787f7b70df8dc3df0a040085
SHA256f673aefd6ece51cb97f919d41a9fe9e3211d95e36af4f476ecae6ce2e7301e02
SHA512d441dd046cdf27d59771107d98204528a71e85dbc2933dda28e1a0bb9a73ee96d51d98b955b7514eb263afe24c69612a975449ccfb46e53b4e5b9349b5f2940e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562fbe1c3cf6789f2148bcce404ad9ee0
SHA157871c8100cc47a826b1e7bffb9ac132efaab3e1
SHA2569a83ae4270f7b1a1ebb6c9cae3c5f20552907bce9d52d578c6772c9096f2f7b1
SHA51297926d3a532ff4587424cb239857fedc2c417ea2f0f41823887464b199563ea3157540e4b4b2028e2a2068fea4fab31bd9686d6fbdb52d9c859c51d3b5306ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9a1116b9b3824053aced127b7b0c975
SHA1943272143b312dd929602d90c1d57b8f544298e0
SHA256652ebe5c014dbf3993088c7e05335d2a83339e4ba92a2a8e6af5d32ef67467d5
SHA512a309b78790d9220f83e277d56ebceba52032ed48c4ddd9c1020971751b039f7afb7cf0098649f22ba77199b4a10252fcd9817f6f32763af4bad73ef6503ec719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517456a3231f24b638af3920673fd805c
SHA1833a72e518cb73cba51b7d22eca0b79aa168e3fe
SHA256c47432bed69235d1e35ce15f0dfc148a402cb508f6aba06e493cb41385bec9fc
SHA512641dce630396b3139ba9ed1f207213d1f54af9b78fd37742cad579cd08442be213f14d1836e7951bb30648181f2f399f0a5c4bbcbec6d409f69b8f461ee59984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f52f1a0bad2ac4b71818c222ea6a1827
SHA16fe8dc882bc5c52e7b6b286dbbe9a5172c3e0e3c
SHA256813e5bea816d801e53ad1d04ec38837dcb602999f5ef83fff2490fb2d16f3805
SHA512e00700a6099f315529cf1eb486a40f682a76a884be0273717f797d5fe387205a4263e387ed0f2f33b4e0d9d030ad634aded3a2d25ca2bd098795f8aec0878e25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0f893d65832712248bff9909c3ac067
SHA13ec4f421daa8a97ee0ef497aecebdaa999e43e23
SHA256205f90653381d0235dbc9e661f0dc15c08ae4e73030cd22c8f7c592dec873f98
SHA51243b125a0e369c7b825e9621062abc52eb4da5e94c996241e0213bedbc8d0888b6d926413d1aa645d1dd52c19c763f4742b690831785875f42c00a448da4cdcf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514f4cd5dc239366ed446a9770bdb4b1a
SHA1a0cd0c273809deeba84a13935d11e91468818302
SHA25637da68a38ed10198f28f817f8ef0d4f489ac7296d871f9c3d0e53cb41afcc80f
SHA512ef9edfd9438f954d59c7969ca3bcf872b0c1defd1249ae87855c8e894b9aaedddfba0c4288c89198ed62dfaf94d73a9489bea319b7804c5403c225fbe55284a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d93383ee2a09b77c15ee7ed36b5f0b9d
SHA12e42ed541e8dbbd57b2457f8ec5a08f21460da46
SHA256b7668fb5a7cf67a487bcfad9cc58c78715899aab03e8216fbc377199eed7b08d
SHA512b162af7cd8b8efcbc7adb574dea36b802458eead9dbaea4f83f85365ce4c2724ae13d1b58d7e553bf1bcbcb412fbf67408247eb8969d8d8dd62d4f9fb4e07359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a5d363bb1785cf1fc10d2a773433c39
SHA13b4507b7e32d0ac83c4b25fdb8539a8498a2518a
SHA256f84fe95d4649f367c850b3c6de7b032c75803af531fb3a67eeb69b9fd2006a2d
SHA512b98184dfc23943f29b2632047beeb1fef36f7a5a1dc1da56dcba09d906d1f9cf1135d2b9e0022778e9325d994826fed37796605e144173856576d8d839b9917b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4d3bbf92f25a63e3774ca16a565cb5b
SHA113b5f7885536f9dad63d1efdbc2451bc4e55bf24
SHA256cd2a48aa57a567dcc537716bd3d316f346fd69ba6b7f3ede75e8224e5ba86f8d
SHA5122ab8ed9de5b975a49e6d7e2979bf53dd412b982ee76125ebbea9843f863df19a8073457fed31bcd7132de6f6055d2b3b4b83e80983addd80dd158a7aa216f68c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b