Overview
overview
10Static
static
830bc4934d7...f0.exe
windows7-x64
6338fdf3626...13.exe
windows7-x64
1342933cb4c...20.exe
windows7-x64
9343ace5874...03.exe
windows7-x64
834818CE171...49.dll
windows7-x64
8360390_crypt.exe
windows7-x64
4360390_tree.cmd
windows7-x64
73896f8a370...e_.exe
windows7-x64
73a061ee07d...8c.dll
windows7-x64
33af4fa2bff...d1.dll
windows7-x64
33bb691982d...21.exe
windows7-x64
93e3f980ab6...95.exe
windows7-x64
73e3f980ab6...26.exe
windows7-x64
73e75e8238a..._2.exe
windows7-x64
6400cad56ff...9a.exe
windows7-x64
940b3cb2a21...0c.exe
windows7-x64
9425c42d610...5F.exe
windows7-x64
7425c42d610...FF.exe
windows7-x64
742d77128db...e7.exe
windows7-x64
74561647.exe
windows7-x64
9457C9141EC...C8.exe
windows7-x64
1046a9660c57...83.exe
windows7-x64
346ca6b1972...FB.exe
windows7-x64
746ca6b1972...FC.exe
windows7-x64
74e60f3c8ea...5b.exe
windows7-x64
84f0b660543...B3.exe
windows7-x64
74f0b660543...BB.exe
windows7-x64
74f5bff6416...09.exe
windows7-x64
7Versamento...__.exe
windows7-x64
94fda5e7e8e...00.exe
windows7-x64
75 Rules for Snort.doc
windows7-x64
7502de64ee4...c2.exe
windows7-x64
9Analysis
-
max time kernel
1800s -
max time network
1564s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 02:21
Behavioral task
behavioral1
Sample
30bc4934d7e29c8c4c4c9be0510fc7558fddf8db666a0343784c5cf1587b3af0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
338fdf3626aa4a48a5972f291aacf3d6172dd920fe16ac4da4dd6c5b999d2f13.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
342933cb4cbb31a2c30ac1733afc318a6e5cd0226160a59197686d635ec71b20.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
343ace5874a5854858e11e6c196007bffc045717ed29db9b03f23d01568e8303.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
34818CE171EA150B91429AC1DD6FBE49.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
360390_crypt.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
360390_tree.cmd
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
3896f8a37034429e9784d767765d85ef6dcde105320568516fac4e31400514db.exe_.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
3a061ee07d87a6bb13e613e000e9f685cbffb96bd7024a9e7b4cb0be9a4af38c.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
3af4fa2bffaab37fd557ae8146ae0a29ba0faf6d99ad8a1a8d5bf598ac9a23d1.dll
Resource
win7-20241010-en
Behavioral task
behavioral11
Sample
3bb691982de416a7a4e57b91211e80bea82dcca7b4bdbf25c0c80451dc138421.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
3e3f980ab668ccde6aafee60ce16e3c35cd91e9b59bff20ce1615d5fb362a458_Dumped_TDS=4FBA3695.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
3e3f980ab668ccde6aafee60ce16e3c35cd91e9b59bff20ce1615d5fb362a458_TDS=4FBADA26.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
3e75e8238a6bbd8817164658696198af_72889f61171de37d6b4d59016c55ec52__2.exe
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
400cad56ff3d210346cf6c4795aeb607e5b211b3dc4a8421b9437621c254239a.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
40b3cb2a210fafdaabdebefe1430862bd1192a80fcde84f51ceb387136d1410c.exe
Resource
win7-20240708-en
Behavioral task
behavioral17
Sample
425c42d6108db6b6b5cbda7a5417b5f55225c47ac588f5f0a293c2b07a78d14b_Dumped_TDS=4F8C315F.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
425c42d6108db6b6b5cbda7a5417b5f55225c47ac588f5f0a293c2b07a78d14b_TDS=4F9906FF.exe
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
42d77128db6bea33966478f01aecda1cf6c17bf9ab5d5782650c1b32cd63bae7.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
4561647.exe
Resource
win7-20241010-en
Behavioral task
behavioral21
Sample
457C9141ECDD9E9CFC61551FEA2BCB86AFF56CC8.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
46a9660c57e244636a28df62e0879300a62552ab9b5cfd4708ff677af7453883.exe
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
46ca6b1972c81eab77202146184afe95b797bd4e3788c59e8036e748b55fc28c_Dumped_TDS=4FB252FB.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
46ca6b1972c81eab77202146184afe95b797bd4e3788c59e8036e748b55fc28c_TDS=4FB566FC.exe
Resource
win7-20240729-en
Behavioral task
behavioral25
Sample
4e60f3c8eaa0441d4ffdced18aa04153bb91b5470bc5441ba5878f7760ca9b5b.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
4f0b6605434c1355b10950024eaa9f695822278f57c29275706c0e5b29b369b0_Dumped_TDS=4F9911B3.exe
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
4f0b6605434c1355b10950024eaa9f695822278f57c29275706c0e5b29b369b0_TDS=4FA6FBBB.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
4f5bff64160044d9a769ab277ff85ba954e2a2e182c6da4d0672790cf1d48309.exe
Resource
win7-20240729-en
Behavioral task
behavioral29
Sample
Versamento.Pdf______________________________________________________________.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
4fda5e7e8e682870e993f97ad26ba6b2.000.exe
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
5 Rules for Snort.doc
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
502de64ee4fe0133a1ea5efa4919c03bbca1adc2.exe
Resource
win7-20240903-en
General
-
Target
34818CE171EA150B91429AC1DD6FBE49.dll
-
Size
170KB
-
MD5
34818ce171ea150b91429ac1dd6fbe49
-
SHA1
765f7cea9ae6e126181e5a78b897304913530d4d
-
SHA256
502386cb2288ce85af522da55916b5a05c71d9a32a80cec396bc4cdd0e0ac665
-
SHA512
e44b009eef9710787ddf63d5038e15112969ef5ac952520f772b5ab78dfe57c42f7562044642f573c9480c76569ef9a7912cc5cd1b0472e4d61c25e79a03bfb0
-
SSDEEP
3072:xUiScf7Taa44mVg6zMe4sfPZfE8dreM9aSW3OKojVbc7n4CRWLvSFlp6+qvv1:xUUm4mG6zwQLaM9aKjRg0SLlK1
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Drops file in Program Files directory 5 IoCs
Processes:
notepad.exenotepad.exerundll32.exedescription ioc Process File opened for modification C:\PROGRA~3\NOTEPAD.EXE-x.txt notepad.exe File opened for modification C:\PROGRA~3\NOTEPAD.EXE-x.txt notepad.exe File created C:\PROGRA~3\RUNDLL32.EXE-x.txt rundll32.exe File opened for modification C:\PROGRA~3\RUNDLL32.EXE-x.txt rundll32.exe File created C:\PROGRA~3\NOTEPAD.EXE-x.txt notepad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exenotepad.exeexplorer.exeIEXPLORE.EXEnotepad.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
Processes:
rundll32.exenotepad.exenotepad.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
Processes:
rundll32.exenotepad.exenotepad.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe -
Processes:
iexplore.exerundll32.exeIEXPLORE.EXEnotepad.exeexplorer.exenotepad.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8F6445F1-A878-11EF-846E-46BBF83CD43C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438403990" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000fbc8ba609f835073b28d26f9bb2734e2bb5432931c45449a6ba8dbf09fbd227c000000000e800000000200002000000063a8cf76e43e3fc92fd1fe025247ce880f97592231372597b838d4e2e407fb7720000000049d6af31b319f938367087688eef2ce5c4297a42b3c5c5cd82c06f4a4cdf739400000002723bf1f2c3560428941f816e80f79db8f51db94734d8bbafc6374462e6e3205d9163402f8bb959db9590a6dddb244b64bd5097b05fa2c643c97671d7a77a414 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10f4617d853cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exenotepad.exenotepad.exepid Process 2080 rundll32.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2868 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe 2752 notepad.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
iexplore.exectfmon.exepid Process 1272 iexplore.exe 1272 iexplore.exe 1272 iexplore.exe 1272 iexplore.exe 1272 iexplore.exe 1272 iexplore.exe 1272 iexplore.exe 1272 iexplore.exe 1272 iexplore.exe 1272 iexplore.exe 2580 ctfmon.exe 2580 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid Process 1272 iexplore.exe 1272 iexplore.exe 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exeiexplore.exedescription pid Process procid_target PID 2364 wrote to memory of 2080 2364 rundll32.exe 30 PID 2364 wrote to memory of 2080 2364 rundll32.exe 30 PID 2364 wrote to memory of 2080 2364 rundll32.exe 30 PID 2364 wrote to memory of 2080 2364 rundll32.exe 30 PID 2364 wrote to memory of 2080 2364 rundll32.exe 30 PID 2364 wrote to memory of 2080 2364 rundll32.exe 30 PID 2364 wrote to memory of 2080 2364 rundll32.exe 30 PID 2080 wrote to memory of 2804 2080 rundll32.exe 31 PID 2080 wrote to memory of 2804 2080 rundll32.exe 31 PID 2080 wrote to memory of 2804 2080 rundll32.exe 31 PID 2080 wrote to memory of 2804 2080 rundll32.exe 31 PID 2080 wrote to memory of 2752 2080 rundll32.exe 32 PID 2080 wrote to memory of 2752 2080 rundll32.exe 32 PID 2080 wrote to memory of 2752 2080 rundll32.exe 32 PID 2080 wrote to memory of 2752 2080 rundll32.exe 32 PID 2672 wrote to memory of 2580 2672 explorer.exe 34 PID 2672 wrote to memory of 2580 2672 explorer.exe 34 PID 2672 wrote to memory of 2580 2672 explorer.exe 34 PID 2080 wrote to memory of 2752 2080 rundll32.exe 32 PID 1272 wrote to memory of 2120 1272 iexplore.exe 36 PID 1272 wrote to memory of 2120 1272 iexplore.exe 36 PID 1272 wrote to memory of 2120 1272 iexplore.exe 36 PID 1272 wrote to memory of 2120 1272 iexplore.exe 36 PID 2080 wrote to memory of 2868 2080 rundll32.exe 37 PID 2080 wrote to memory of 2868 2080 rundll32.exe 37 PID 2080 wrote to memory of 2868 2080 rundll32.exe 37 PID 2080 wrote to memory of 2868 2080 rundll32.exe 37 PID 2080 wrote to memory of 2868 2080 rundll32.exe 37
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\34818CE171EA150B91429AC1DD6FBE49.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\34818CE171EA150B91429AC1DD6FBE49.dll,#12⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:2580
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1272 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
553B
MD554616112552342526cd2d4b3f1ea3503
SHA182f15e2744c02d6df464dae79098295cd00e4705
SHA2568f2e8f4813b0373b09bc727f11db3c03b66507e0c422533f99e18635d3b857fb
SHA512ffb9d07600331877a5b3c8c3af90a99281114b065c9b58e14b9264edf90ba558607de53907e4ff01afd75b1fcb5680b41575fbcde227e7f208b89bedd6e2f376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bbe68a8908e62475f5b23de3bb924b9
SHA1caf43eb5a10afae02c59137cda2d25beb1a0ebcd
SHA256dbb649f0892a16a7f32d563cca9c7752d401916af644fff1a0663a19f0df4d22
SHA5120780782e7235463fd7b496e463bc9280e6832008ebd0bb5377c29199b1a0984d2552cab19e65fb5bde41de52618a583aeabc5d2ce19db2402645a96608228474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f12b59268fad010a4e843412753c1e1b
SHA1536b94828491e6c71254167017d20cf65e683a14
SHA256dfa81f45fdf7f2f5ba8e9fe237e9168cf0efdad59d6e17c06075a3e9779a61aa
SHA512431dda881d4fe44674aa68afe2a58db3a0b1ab2b9258db0f8fa20fee6346821514e29d9576b6f52f9c5eeb0b6ed1fdd62e29162d51994a26c0710f80d97f468f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0014bc73c20bdc760d29668737c0b91
SHA1870c1e05e07e165a6ed3cb760643958e0bf52401
SHA256196545373652599029a8205c75548c5709c6311fb27798f289ec6f0a33df1db3
SHA512d3e86bd2fcec04312c1f50f769858c5fbb242fe939bb85e0d75f100652412668d88b4240f493d31ef4c36653b35907244a7600bd78ad75a05dce4868fe80fbb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b438cfb1a39571fe760420594378baf
SHA169ce1b2a612ecaf64c4c24b2526acd67dd8ccad2
SHA2566f6b6a0099f15080e38b29aea6c57b84f83ea759f624c1b62bebb9ad3dc59d35
SHA5122bf74a07da61ed83a0b6d7e373211c4b3f5b9ce0f6c2fe69d6703482cc9ff883b6223296c9580c10fcde9f4d0b368212f200b3921b3231c0eb23a77daa2cc8b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa7eef75c347ff7dee8a5d849cf4423d
SHA184197f05de0f9877f67dd30040fe703ec2559cd0
SHA256c36d37cca6c1bc9357121d39aa5f0d936257e2f1cf6f06611dbb9ec1f171e7c7
SHA512b9f4c776f2c7a5d39e75a8aca404f5c47d7a8c2be210fc2ff3d0ab62a6616105ed8399c14c26cdb2ae84008021e53fde35e6e7957ae3b853b5163db36631f522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583e4c2a3c5122c97d72bfde215857a51
SHA1215e94566fa997742910468118b666211151cb97
SHA2568c57b053282649ca4c4bd1b5179611274935c990d193b221f98ecdd0a3c48925
SHA512be6692a2733264f84a9019e174690d065324687e6de8cd408bcb5d48feb329be0b93368939c4ef32c5ef89af103e08405d9f1d7a0cd377aa66a688eaaeff56a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59983973677a9917f1c38e369035a6672
SHA12421f084a84929461d417dd1f46246f9b1586924
SHA256f2e3e008e1dd13f2231b7a6037a70495de80d8a13991eaf4338321c7b317e012
SHA51250bdfd6192e5dda4c6632327e7d4249346d48b6c15fefd41a9d6f46a75df57a5c03a35e322781808a66da7ee7c36f0ae0cdd893f031fbfb04f19a93fa2a52d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1c280b0eb2fa366d8cfc456bccd7d65
SHA18bc66d2b52b0e956408e0064b933eb35e68848bf
SHA256f086055e0882d7f19adc9d37a4e484fa8987f24aec0c273a189eb5b93001e1ad
SHA512c731846f222a9954ca80965daaf02b594a091b8e625b7f964d89a252a1897f932db0de8876daa7e94a583ec5fa36276adab079364fb7bac7013ed1fbc3575ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5158e22f63e36760ce371ccb230d4e281
SHA151c3cc70328a27cd45363d7983c85eaf54508df0
SHA2564e601853a22cd12e3527e22602d04617a7832542c32c4b3d25b38367899bd59d
SHA5124c5da0fa7a4cda148ef5b4e2349e8d08138cc5f1ddfa534777e1dfb62f14221146d123af26f0ab541f57847414a2824845c58d3854d87512016baff66d1ee806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5173002c980f8f1345fb6a35ef808a1af
SHA1acd6169a080e94356239a4a95120222d6b1b8132
SHA256b8259d3843f927828d0808ef4cb247dc176653108628e71d12999fcaabc3596d
SHA512bf81863b88385907264a913dac1d86efa8ae95888f14023840465a070babde887e4f5d5d97520768e604e275600137278df59d1e39f3c515870270743ffc9c83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5ed3cc735e2077ad78359e0a90c178d
SHA1c559342e5e2ed8ea44edf6bc760a0d935d63cf4a
SHA25650a709290591dd3bfd11a6a33f094caff7e08d31583d6a863b5bfb8bffaeca37
SHA512eb2f1bed1042a4aa0d8ca9e5ce67938e9f28f0799f029ce87a283051a84c2da751eb015ae43d830d1073aef35ec77226d742c9a27cf6304e8cdf7c18faffd51b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b24e5c8587d463bbf9a0be638138ac5
SHA147faef74c15406f4e00c943a864d971e7cd87c60
SHA25677edddfba5feae5f2fa0b11ffb6ffce22cca8bd3d8b15227ecbbd8ec3ae0e604
SHA51283ca856f62c0db56d35d2673941162263662e6a95e5db864b9af75a093195a25ac59a5099786c0eb2f9fb20e130d188b1dd0e46b2af5649cf47ca124fadd6c30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576732b6716bf375fef8c6723633b163f
SHA1d3113be9648578d1bd41ef5c45d29ce0c4c1b0eb
SHA2567e5e42312602620a13bf9080d05a81ee97f33cc35a6f97403861ffa96d6efde2
SHA5124a31c19042be97b1465243724c4362246474bdd01b5da876d2f280eaff8dfcb4dc4048522cd67a04b774025a55c35addcb0f3b826e44180be294663d8e3de1f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d610e59044163134153765d42e01334
SHA14c35752023c6a7e38197bdefefb84e9e9be087a6
SHA2565253094cd674de591e0ae683067f166f72a350ed8a8e2ab32c4d36e02eed240e
SHA5124149e1445945adeef705b02bfd91f1771de2d9f831419486972d4fd520c561edadcc8ec3fb64b97e806fa8c001c853db9502b796bdab1f98b797f6fa127bc047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523aaa22e428c438403981d0ecb2797d8
SHA15a3adc1549187584c1fdf8c63dd19b0ad996c2e1
SHA25688890f5240b25294319532c9f4d61b458c8c819dc0ac3c053daa4453d46accdb
SHA512ba9bbb82fc4c04f2ee3d52e4b7b90219bd787836ef32acb624315a35ca03c19c1c0e96d9d41d623b321060220ad412bf4d08c2088b08b72b6b750ce1a0c71faf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f04db8fd5b1c21d1f5330dafa27f761a
SHA18fdfce2a6a8f7a77549b38da98f79973d17afec8
SHA25602118aabe2053279fff83a1e6eeebab267eef31a9056deb4459c252bc23ef3f2
SHA5125ebdfaf6715d8cd4c4da42e496654d596846bfe9732f1334b6d9d5bd45b50326cea288448788c4d859ad854d76200034ece5ed3bc2d0cb385217cf89ba3c9e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9c673c1d050a0643690e654deecf146
SHA1a1047e8ed5b70564d7eb2a92bdd54fa7f86fc99c
SHA2564ed97ae418c49cb0fbc5048cb82aac40d06ccf609e5f25c0dfe21a281ab15a47
SHA5127b6049527cabf354de9809865826baf264dde89ae054da850e31ec3ab6ca6bba1b3baae722ee810d1fdd8694825190ce79fa58b362506c575e272293d2259b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aa9e1ea588e829441d481f52b3bc278
SHA16138b9d73addc4c651f843cf5d3f6f74080aa830
SHA256c897f1bf13a93c8c73c1a17d9169e4e6bdd57f83fec534a262c868d29e0d2462
SHA512eccf25e629289614d13a1786bed6f9f95dea7e1fe06b8f9132a7276a5747d74af7e6665f67a2bf04416515ad61965c179cb6486f0a6d67c06e2d8ef8b467c896
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b