Overview
overview
10Static
static
10757e3242f6...b4.exe
windows7-x64
976fe72e0ec...ss.exe
windows7-x64
778d4cf8df6...B3.exe
windows7-x64
778d4cf8df6...59.exe
windows7-x64
778db508226...69.exe
windows7-x64
97965f6adf3...ss.exe
windows7-x64
77B75B33BCF...B5.exe
windows7-x64
17E3903944E...72.exe
windows7-x64
77dd9312307...ca.dll
windows7-x64
37e4c9a7e39...1f.exe
windows7-x64
980eb72d781...B3.exe
windows7-x64
780eb72d781...9A.exe
windows7-x64
7845263c869...c8.exe
windows7-x64
98524224187...8f.exe
windows7-x64
686be3831f5...39.exe
windows7-x64
68791931bac...DA.exe
windows7-x64
78791931bac...69.exe
windows7-x64
787a4f3f9f6...88.exe
windows7-x64
789fb6d7ff2...f6.exe
windows7-x64
98c59148535...21.exe
windows7-x64
98d372fcf8a...e0.exe
windows7-x64
7900.exe
windows7-x64
9911d5905cb...b9.exe
windows7-x64
791d24e0657...eb.zip
windows7-x64
992ac6be4d9...5b.exe
windows7-x64
97512f4617...7c.exe
windows7-x64
1098aadc95c5...e7.exe
windows7-x64
109943256.exe
windows7-x64
109B9517FA15...DF.exe
windows7-x64
79b7eaffe4d...c8.exe
windows7-x64
10a322da0be4...44.exe
windows7-x64
10a42252e674...34.exe
windows7-x64
9Analysis
-
max time kernel
108s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 03:03
Behavioral task
behavioral1
Sample
757e3242f6a2685ed9957c9e66235af889a7accead5719514719106d0b3c6fb4.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
76fe72e0ecdc389b5749df5fe406cb70110b1ef8b64e51cf0a96da2fa2ec5eb2_not_packed_maybe_useless.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
78d4cf8df6fe5717a0f4bad6cbfce6546fb59a45ee0ac3797b264b28e24ddc0b_Dumped_TDS=4F9911B3.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
78d4cf8df6fe5717a0f4bad6cbfce6546fb59a45ee0ac3797b264b28e24ddc0b_TDS=4FA04B59.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
78db508226ccacd363fc0f02b3ae326a2bdd0baed3ae51ddf59c3fc0fcf60669.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
7965f6adf3261e8820fe583e94dcb2d17dc665efa0442743e47d27c989fcb05f_not_packed_maybe_useless.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
7B75B33BCF4ECF013B93F84ED98B3FB5.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
7E3903944EAB7B61B495572BAA60FB72.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
7dd93123078b383ec179c4c381f9119f4eac4efb287fe8f538a82e7336dfa4ca.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
7e4c9a7e391be4367d79bd1ab92b748d440e13fd5ca6c0820b30e6e9c670871f.exe
Resource
win7-20240708-en
Behavioral task
behavioral11
Sample
80eb72d78175761e34378e06a5ca13b26edd6c47ee18e0d222fa068a249785f2_Dumped_TDS=4F9911B3.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
80eb72d78175761e34378e06a5ca13b26edd6c47ee18e0d222fa068a249785f2_TDS=4FAAF59A.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
845263c86931440e934cf40f4461dc14903a474f6f5eab4773482842855ba1c8.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
85242241870190a81b55d0ea723c25391fff14140bac149a32630c5f892a3a8f.exe
Resource
win7-20240729-en
Behavioral task
behavioral15
Sample
86be3831f5d8a975b0924168117fc7fcd1f5067ac5935c657efbb4798cb6a439.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
8791931bac7d8afbb30dc1d32a4dd54ee59a2160580a83d822a927039d8ca98f_Dumped_TDS=4F83FCDA.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
8791931bac7d8afbb30dc1d32a4dd54ee59a2160580a83d822a927039d8ca98f_TDS=4F84A969.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
87a4f3f9f6dc263378f2f01db5f2c988.exe
Resource
win7-20240708-en
Behavioral task
behavioral19
Sample
89fb6d7ff29b0c349c19df2e81028a62a2758c33f2c72b87dc11af4f22d3c6f6.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
8c591485357e45a09dad3116496e6f686fa11f445a6bea5ef3cd5ed1ac078821.exe
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
8d372fcf8a97223ebb86cdfe707d3035dfbfd4501c5688cfa82a9a4889e637e0.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
900.exe
Resource
win7-20240729-en
Behavioral task
behavioral23
Sample
911d5905cbe1dd462f171b7167cd15b9.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
91d24e06572099ba0aa5c20be6b1021fa48e864913fe3676ed05323e6b68fceb.zip
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
92ac6be4d9215b237d624177ca0543844d0dc8d071660ae4a4cf7c93cc11505b.exe
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
97512f4617019c907cd0f88193039e7c.exe
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
98aadc95c589e064a542802bbf0ef01ef00595c34d195f1a1e6443909846d2e7.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
9943256.exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
9B9517FA1515F47A502FE56536236A20BE5BBADF.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
9b7eaffe4dffcbd06445d0b32785cdc8.exe
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
a322da0be4f0be8d85eab815ca708c8452b63f24d0e2d2d6d896a9f9331a6244.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
a42252e674a09a0b689e71c88f59969f538a473da647cc4eb5457a5d5e03a234.exe
Resource
win7-20241010-en
General
-
Target
9943256.exe
-
Size
134KB
-
MD5
25e54dfbce20546da0e8cd8152ee2b8e
-
SHA1
3f0b80ef090c0b14821309b6110839cbd2312afe
-
SHA256
4725414537a3605ee6cdd226d189419cc5d3a7df1b092b526b61b8c5e2a59386
-
SHA512
215f4d5d35153622f159970e0097cde6e00d387f5636a1c28d3de6c0f5f84b61dfcaf4d390464eb888738786a0028d7d6f6ce13a29e07116ad032027428215a2
-
SSDEEP
3072:r+qf9FUiVdubWibOQNi3MWL4FksNYFfPK:r+iLUwAbpi3MDEK
Malware Config
Signatures
-
Processes:
plugin.exewatcher.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" plugin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" watcher.exe -
Executes dropped EXE 2 IoCs
Processes:
plugin.exewatcher.exepid process 2800 plugin.exe 1136 watcher.exe -
Loads dropped DLL 2 IoCs
Processes:
9943256.exeplugin.exepid process 2016 9943256.exe 2800 plugin.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
9943256.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Module = "%ALLUSERSPROFILE%\\Media\\plugin.exe" 9943256.exe -
Processes:
plugin.exewatcher.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" plugin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA plugin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" watcher.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA watcher.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 2 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
Processes:
cmd.exedescription ioc process File created C:\ProgramData\Media\plugin.exe:Zone.Identifier cmd.exe File created C:\ProgramData\Media\watcher.exe:Zone.Identifier cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.execmd.exeplugin.exeIEXPLORE.EXE9943256.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plugin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9943256.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000004a44c3a4b5fd07bdb49e111c0160c7768ef63fd9ecd76d81651c33639acaa331000000000e8000000002000020000000ef64d8f6bfd262e8014987f6eef4d0210979130507ebd774938bbfdd3af9026b2000000091fddb6220f84940b1c18808c7680e873bbb8a8f749e06bbfc7738e3da0e2d9d400000006cdb1d60e2a42976e59b6576e49ee5941c43788c7e1ebf5b22449905737c608bb8449c7e78831acc194be7d9e35bad65a15563c2a2c159b73c51d23ce2905f42 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d001764a8b3cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74083F91-A87E-11EF-8D81-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438406525" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
NTFS ADS 2 IoCs
Processes:
cmd.exedescription ioc process File created C:\ProgramData\Media\plugin.exe:Zone.Identifier cmd.exe File created C:\ProgramData\Media\watcher.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
plugin.exewatcher.exepid process 2800 plugin.exe 2800 plugin.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe 1136 watcher.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2548 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
iexplore.exeIEXPLORE.EXEplugin.exepid process 2548 iexplore.exe 2548 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2800 plugin.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
9943256.execmd.exeplugin.exeiexplore.exedescription pid process target process PID 2016 wrote to memory of 2412 2016 9943256.exe cmd.exe PID 2016 wrote to memory of 2412 2016 9943256.exe cmd.exe PID 2016 wrote to memory of 2412 2016 9943256.exe cmd.exe PID 2016 wrote to memory of 2412 2016 9943256.exe cmd.exe PID 2016 wrote to memory of 2760 2016 9943256.exe cmd.exe PID 2016 wrote to memory of 2760 2016 9943256.exe cmd.exe PID 2016 wrote to memory of 2760 2016 9943256.exe cmd.exe PID 2016 wrote to memory of 2760 2016 9943256.exe cmd.exe PID 2016 wrote to memory of 2800 2016 9943256.exe plugin.exe PID 2016 wrote to memory of 2800 2016 9943256.exe plugin.exe PID 2016 wrote to memory of 2800 2016 9943256.exe plugin.exe PID 2016 wrote to memory of 2800 2016 9943256.exe plugin.exe PID 2412 wrote to memory of 2548 2412 cmd.exe iexplore.exe PID 2412 wrote to memory of 2548 2412 cmd.exe iexplore.exe PID 2412 wrote to memory of 2548 2412 cmd.exe iexplore.exe PID 2412 wrote to memory of 2548 2412 cmd.exe iexplore.exe PID 2800 wrote to memory of 1136 2800 plugin.exe watcher.exe PID 2800 wrote to memory of 1136 2800 plugin.exe watcher.exe PID 2800 wrote to memory of 1136 2800 plugin.exe watcher.exe PID 2800 wrote to memory of 1136 2800 plugin.exe watcher.exe PID 2548 wrote to memory of 2832 2548 iexplore.exe IEXPLORE.EXE PID 2548 wrote to memory of 2832 2548 iexplore.exe IEXPLORE.EXE PID 2548 wrote to memory of 2832 2548 iexplore.exe IEXPLORE.EXE PID 2548 wrote to memory of 2832 2548 iexplore.exe IEXPLORE.EXE -
System policy modification 1 TTPs 4 IoCs
Processes:
plugin.exewatcher.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" plugin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System watcher.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" watcher.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System plugin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9943256.exe"C:\Users\Admin\AppData\Local\Temp\9943256.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\cmd.exe/c start http://youporn.ru2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://youporn.ru/3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\ProgramData\Media\rdb.bat2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2760
-
-
C:\ProgramData\Media\plugin.exe-wait2⤵
- UAC bypass
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2800 -
C:\ProgramData\Media\watcher.exeC:\ProgramData\Media\watcher.exe3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:1136
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD525e54dfbce20546da0e8cd8152ee2b8e
SHA13f0b80ef090c0b14821309b6110839cbd2312afe
SHA2564725414537a3605ee6cdd226d189419cc5d3a7df1b092b526b61b8c5e2a59386
SHA512215f4d5d35153622f159970e0097cde6e00d387f5636a1c28d3de6c0f5f84b61dfcaf4d390464eb888738786a0028d7d6f6ce13a29e07116ad032027428215a2
-
Filesize
97B
MD55303b5018a6cd19200b98d31ab04f25d
SHA18285eb92f131111e40d2dc864d3b386dad6b9129
SHA256464648d492af6bb50cf65ddcbdca3e90d4b224ccc6f4ce3944d439b6c32da524
SHA512654aed00850f6b7e424a5ec5acad086a51fb54f5f944238979f43fa1aac430661250210fe5f38dcd78e46311adc7e6b282cb5c41bebfe5a7d297afd6db6de21b
-
Filesize
13B
MD538de427224a5082a04fe82e2bd4ea9ec
SHA17e4a53de1f83762dd2febd39b818e2258bc83bc1
SHA25612f99f53144294750fe8713d580eda286f4bd95cd9c840db8ab957def8040028
SHA512ec3f3c324eeaad91ab0efd47b3084493d863f969344fa1ba87ace1974908053d396673b44c33b4dceeef792a74ad9278e06acc27c83459af1153de52f83afcbf
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD59bdda174b3af9d63b92902748ec9d3c4
SHA19b0506dbb4aa39a0273beaa15fef4fbe1498908d
SHA256343fce68b4cdeb16888ea7d5c7aba6d5c49db7c998cbf696d6d8c2ec9d97b576
SHA5126ff803027acd8676f3b29ac2b302147832603fcbf4fa0f9c16546f005400d0638dedce40e812398b269827c4d9d5a53f99db7af79922d36a4b452fdf64d43747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ef1dfb5c536fa507a32d22716d1a417
SHA12d30b006c53140c7657dabeab9dc9eb6ef46e91e
SHA256f044839982442901c4387ff73761b9e7880b9add41158f79548dd34319fb6633
SHA512d39f9cc6a87e05d13c877b4cc4ec5660a4c45038983a5b1aef46556e51af619148ac9b6099d2f64ebb0188a7a5ec736c4e75832d6fcd73ef66118caa089d8be4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfce2da501a854d9c106ede584d1406a
SHA16a2ff13b533ecbe7d8b73a2a1c7cf11763d463e8
SHA2563e9f51d5e9e901196022e4a09936b5e4817027ca5ffff3a62f5d3e5647d4ef98
SHA512d7334f7be05ec9ba3ca0508dda8e584acf1905d1938fa66bfbc8ef4853a6a33f6fa5d77f071d82fc07d90f400fabf1be3314b65993dff57b3e05db2cc130bb63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb6a4c714f9cd643dd454946e668a93b
SHA10c4902c1a43d504052e1ab6a97cf6446eb777610
SHA2565958626ca4a86d4764d4109db026aa4dcc822cbe4134b531acdff0bfb5e895a8
SHA5128518b4585b0a9920c0a07eb532d9bac9239b1313b989eeb1cb8f56edc825d38b3aa97e871429e7803641b969920a671fc24db9db33e6c37a3400513fb074ab1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507216bed7123ae50f6ccbf14e149b199
SHA133bc07e1daf87dca70876138d451fd6de55d55b0
SHA25662ced37fe5fe899626aae56a7d80ad72758d31d3f200d0b940a1d5a0c57128fc
SHA51279f64d39f5249d659a38f09072e3044b83655ee102bc41525014e1f5d8a41ab0a3c0ed6176a9be26f5479c77a5cb648ae9f92f0e04a14e0237fb0643067a807b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f93274956fb54009e91899ff601e2bd5
SHA11ffc4062eb435bd7d762b9116b08620d89ca4a22
SHA2561ab2b9f52f0bdd5a0ce291df35c9f106bffe4238363f8e1d83b2e4f0b46a4c7b
SHA51206e17377a3819d0b50637eca6259e6e3870314cfa1012adc0f1cb84401027c686afdc4f9bf75c39c26873c1d3ca98a8b9ad09e4871625fab2bb4d2261143444a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5393d4384e6e54e62bae559031c19d6bc
SHA102d3e33e5c59098510335e472589e83599b39269
SHA2563a2130e7dea7374e4792a03016f8eb9da364a31d7960efde1386f164d0c3a2cf
SHA512e1fb075c24716d23b639b35d0c4f2bc565444b486e8cfeb5361db213a09c4772b8db8e1e8970c28b6a666474958a1353871a09f733a268f94bcf0ae96e9ca184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d1315f2942d2f9164aeba570e006396
SHA1da42264303f3495d63af92a3ecbfb787d13777f5
SHA2561588f9eedc4c016b571337761f06b98d8e25e93052e3d150e7d40cca58de0ae8
SHA512754dd0d94d2478df02114b202d3b42331695bf39ed588f6290cc87d8e4ac155cec68a2295c11eea980bea1539f9b4a9ba794cdf9cb4f3df378af4ed3dac4dcf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2c5f9f2bd2840d19b322da94252d814
SHA130d03327d8af8189f2952e58dbe785960d1f7660
SHA25600129ce5ea7224f542c530e07898f78726a688e999604cbb54be36dc905a7998
SHA51212add67aa8febd873651563ed41d256a0382509e17b320ba6143d938100de7e7ba094741bb399d59a92b4247c1091b8801712b6773bfe704e7f3d3cf4d65dc87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5124782982e966e7f436f993b4aea868b
SHA155fdbf77ef7975d514860fa1691a597114a29c8e
SHA256b5d4b79179649de40e1e27db04b2b0a5393b9cba93be4b5b6a757b723821ab6f
SHA512be01f926fd6509b97c8a8b8774ccf9f05872603bc886a00a231208ba759cd92d8f0160d84308c37ee6d5832a2380e6bb8b30967c6d807ea0514c3fe8aa60713e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b2acacb4e3e6957a1162c004721ae8c
SHA1d1327dbc488d82863016d09cc9ca1a0123162dc6
SHA25613374377ad4cc1284d6a12398c641c572c91b6be7c2c7b695d0ddda4b7287e2a
SHA5125d65958b03ad4be4b742f24c376a2cdfb441d04948ff65890c50d5fcb693f887efacbd774a4d8d375db88e21f99f35cf4f46bc0b1e2419a439e7a689772f05c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517235fbd848a4a72058395a0bc168885
SHA166876636c10e2b9d6af67961a4a7151ad3f71902
SHA25657f5e65feeece6dd7e1a6817ded8116e1cb6e97ce0616330f7c64338233aed25
SHA512fa3067a2e59984c68c8b42fe35f45dbb1e96be7467557409c537f88a4f54f1a882dad49ce19f6f8393c26525fb926d8ba870e51662c48428072d0d6574eed378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5c2039f32934856792c9bac89d31867
SHA193e7f9e7c3f7400dbb2ce226057dbff296a0a150
SHA256c2aa2043169f3c896d68b2efc3521a44d3725780de98b123fc5830f93b30d878
SHA5120817747fc37f100255f77cd6bca6fb5792e57cd4a30f63be35db6cdd9623085de0a310717c877e1dc1f74ea5ac8321d2c44081b6e23268ab7e6d48c3b249808c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517f6838aa37e82a22cc8a8a4b51d9ad0
SHA1bcf52e92d0a38e079d04d16388a35d4ef7dab529
SHA2564eb9ad19f8da6710206bc8d5aca51cbd1dd8d258da5b0badcab0ebb300bbebe5
SHA512d0376bb30702d495af2b634d53d5471fb04a66c0f9ab384ea542227f31de47380becb7715648d242f040ad420671dfeddba7161e476bd30ac0c2a33e3a076726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD54caceb208912ad9dee9bf4a1cd3ad29e
SHA18ab047aa80af65fe83f09aeded6e6e28a211f6cd
SHA2566d6b6377e2c9212c92e2f295997fa350508a16cc902a30a7655dbe1c9277e24b
SHA512405fe812d7117ba04b6508472478d7f70df17f92d582d330d91949bac0e602665f4bf11feee6063fc12fe0fb5f072c06a9cd506167939833f726a910eb6dc4fb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b