Overview
overview
10Static
static
6AES-NI.exe
windows7-x64
7AES-NI.exe
windows10-2004-x64
7Abrechnung.exe
windows7-x64
8Abrechnung.exe
windows10-2004-x64
8Box (2).exe
windows7-x64
3Box (2).exe
windows10-2004-x64
3Box.exe
windows7-x64
3Box.exe
windows10-2004-x64
3a66dde2298...43.exe
windows7-x64
9a66dde2298...43.exe
windows10-2004-x64
9a7768f4973...e0.exe
windows7-x64
10a7768f4973...e0.exe
windows10-2004-x64
10aa7ff3bc28...1e.exe
windows7-x64
7aa7ff3bc28...1e.exe
windows10-2004-x64
7aace43af8d...99.exe
windows7-x64
8aace43af8d...99.exe
windows10-2004-x64
8ad3cc219a8...ws.dll
windows7-x64
10ad3cc219a8...ws.dll
windows10-2004-x64
10aee03626b8...b1.exe
windows7-x64
6aee03626b8...b1.exe
windows10-2004-x64
6afd3b729cf...2e.exe
windows7-x64
10afd3b729cf...2e.exe
windows10-2004-x64
10b56c4569d6...ss.exe
windows7-x64
3b56c4569d6...ss.exe
windows10-2004-x64
30.84762379...67.exe
windows7-x64
70.84762379...67.exe
windows10-2004-x64
3zsgblrbrum...ke.exe
windows7-x64
7zsgblrbrum...ke.exe
windows10-2004-x64
3b7d9f11c16...b0.exe
windows7-x64
5b7d9f11c16...b0.exe
windows10-2004-x64
5b8f60c64c7...af.exe
windows7-x64
10b8f60c64c7...af.exe
windows10-2004-x64
10Resubmissions
22-11-2024 22:54
241122-2vh7gaxmfl 1022-11-2024 03:27
241122-dzqkcatmht 1022-11-2024 03:16
241122-dsgc4atlgs 10Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 03:27
Behavioral task
behavioral1
Sample
AES-NI.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
AES-NI.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Abrechnung.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Abrechnung.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Box (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Box (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Box.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
Box.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
a66dde22983583da6d3b1e5b9eb1e8fb019f5157eda508305942292c0d10fa43.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
a66dde22983583da6d3b1e5b9eb1e8fb019f5157eda508305942292c0d10fa43.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
a7768f4973ad7cf8217212a4d12dbae0.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
a7768f4973ad7cf8217212a4d12dbae0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
aa7ff3bc285bcb4ec48bf2f361f0ad0a1d9fc8f17b7323d2f0615ade68973c1e.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
aa7ff3bc285bcb4ec48bf2f361f0ad0a1d9fc8f17b7323d2f0615ade68973c1e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
aace43af8d0932a7b01c5b8fb71c8199.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
aace43af8d0932a7b01c5b8fb71c8199.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
ad3cc219a818047d6d3c38a8e4662e21dfedc858578cb2bde2c127d66dfeb7de_PonyNews.dll
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
ad3cc219a818047d6d3c38a8e4662e21dfedc858578cb2bde2c127d66dfeb7de_PonyNews.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
afd3b729cf99fb9ea441f42862a4835d1d6eeb36ee535f9b206e3a00382c972e.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
afd3b729cf99fb9ea441f42862a4835d1d6eeb36ee535f9b206e3a00382c972e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
b56c4569d639e8ce104d9e52dffeba6d18813c058887a3404350904811f32d54_not_packed_maybe_useless.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
b56c4569d639e8ce104d9e52dffeba6d18813c058887a3404350904811f32d54_not_packed_maybe_useless.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
0.8476237917779167.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
0.8476237917779167.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
zsgblrbrumorwxfizuke.exe
Resource
win7-20241023-en
Behavioral task
behavioral28
Sample
zsgblrbrumorwxfizuke.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
b7d9f11c166fa1a4ceef446dd9c8561c77115cb3ce4910a056dd6a361338a2b0.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
b7d9f11c166fa1a4ceef446dd9c8561c77115cb3ce4910a056dd6a361338a2b0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
b8f60c64c70f03c263bf9e9261aa157a73864aaf.exe
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
b8f60c64c70f03c263bf9e9261aa157a73864aaf.exe
Resource
win10v2004-20241007-en
General
-
Target
aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe
-
Size
218KB
-
MD5
35f68acc0c3d5761a61975ec77b49cbc
-
SHA1
f6d03e713bc9b47265141d9f9b83ae634d43d204
-
SHA256
aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1
-
SHA512
6a9d131e7c4f310ec77cf3c9c07c75dca279b7ffd6c46b252c559947900f1d754400fc51ce12b8afde86a0fd758e1b68d00a2e5f9144ad019d51bff5c67a4656
-
SSDEEP
3072:HfVD9B1hzRAjEdJNCQ4woDZD57Wr3FKajQNR9MiYbuWjqgdcnfKvdHmN5b3SM:/jlVEEbNtoPajxu85cfAG3
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 32 checkip.dyndns.org -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ielowutil.exeIEXPLORE.EXEaee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ielowutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31145102" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31145102" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{C0746243-A881-11EF-AEE2-468C69F2ED48} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2498666129" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2496634659" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31145102" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2496634659" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439011045" iexplore.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
AUDIODG.EXEaee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exedescription pid Process Token: 33 3364 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3364 AUDIODG.EXE Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe Token: SeTcbPrivilege 1244 aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid Process 2948 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid Process 2948 iexplore.exe 2948 iexplore.exe 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid Process procid_target PID 2948 wrote to memory of 1964 2948 iexplore.exe 101 PID 2948 wrote to memory of 1964 2948 iexplore.exe 101 PID 2948 wrote to memory of 1964 2948 iexplore.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe"C:\Users\Admin\AppData\Local\Temp\aee03626b83a88b71b06899116cb7ce4b8092365103d69792b0c2d7153f24cb1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x518 0x33c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3364
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:468
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2948 CREDAT:17410 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD555e40aa7a274d26f0bb8e2117239d1bd
SHA13174d1748da1dea0226e5b485400c5a139b6dd9f
SHA2561d11d5b7b9240006ea7860d39703d111fefaae92f3c67259f0c743417e634a8e
SHA5124b6de1f6ed69e04740b16428e984e1476c0e3ebb37ab8893454a1c271c2fce65fb5c4a355f1db0eb00560a6f951ee8102fb9629abfff5fd1ab363ef53cd2253d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD535f9d64e8b1ab1ca4af015c690ee83a4
SHA1410bceb09741e78c8495159049f3c3db7c108d60
SHA256d4bd73641efb16f4dc9039adb0f2b9cc353b13156f181441c4f0f5decb49c72c
SHA5129c7b2dd90c8d3f6e4ee09c586c640e4b55ef284b2e41c2fdb979eb240be9ddfe081ce679ed49cdd490e1d75ecfc211776465ca2f32b4864a58199386e0d24656
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\0f5007522459c86e95ffcc62f32308f1_4304acb9-c3f6-452a-9860-eb4e85d38d4e
Filesize1KB
MD541aa7c77149db4f974c02770a426dc92
SHA116c28b76b0550feb89f9bf8b33ea942eb3ac93f8
SHA25681ebf38cec13407a05e7ddaee5f339eda3ff16126d726c156fe0c21071021efe
SHA51274f5569ec42dc70311a6c81f19534a83e85d14674b0c3e7b733eb9600e4078dcbc7eb812f6c0973a7d9bc03199ddc19e4f609c59a02da2f84cfa0bb2e6fd8b79
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\0f5007522459c86e95ffcc62f32308f1_4304acb9-c3f6-452a-9860-eb4e85d38d4e
Filesize1KB
MD57ad20675dc8079158d20a3081712d2bc
SHA19e4ca69179fdc88d8d9e5a86c1bc1d8a32049922
SHA2565ab3179e5453f4320ac0905e90aaf44a62cf0f2aae1469708cd6dbb9daa22008
SHA5126310be3b13e8533ea017e80dc7feb12a37b0cb5031d0ada78bcf6e63beb4ea51851c08bf95311017c0348e170d94087ba9cd7a2c298e38f553b88fe6f07d2a21
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\0f5007522459c86e95ffcc62f32308f1_4304acb9-c3f6-452a-9860-eb4e85d38d4e
Filesize1KB
MD57e76291e92159e438150c96c483ef6f7
SHA16e9d2ecd81eb344504b2b2469532445967dbfa70
SHA25602d8995b772cff7ae5843f7a0f09ff369cbfafdaebb54a3023c3c511a589f196
SHA512d3cbcb9b4647a276a14e7771bbf1057ee2cb4786da9b7bc7907389279795bb4abf2277527babe2bbae8770f76b5c902af2c57013984b7db27d44e4674e925131
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\0f5007522459c86e95ffcc62f32308f1_4304acb9-c3f6-452a-9860-eb4e85d38d4e
Filesize1KB
MD59f85d5bdeacf57df5bbaf399711ab68d
SHA159211d1a5e4dd510e6774f5690dd94cf7b3bb884
SHA256a34ae7dd22334f3c972cb97ee31b9d593ace65ca84ac177f88f25b842a780d17
SHA512c20ab15b04f5982d6ffd26cc1c67fd0a6c17f83163cad5b41ed650a7eeb9eed915eb6361ef4f44a6c279324fa416c062ea2f6de81b48891f9189717fb08e77ad
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\0f5007522459c86e95ffcc62f32308f1_4304acb9-c3f6-452a-9860-eb4e85d38d4e
Filesize1KB
MD5ad1d715ee1bca800ae7d54f85ecec75d
SHA1221a8debf1e4eca2c8a820bc427eaf36f63786b1
SHA25657933d753b9309c07c63194eac8e363189da3fffc57dd5453ed474d338acf178
SHA5122d51581439fb7c12ae2383b308002d4f32e494cbcc62ceb12db49c238518c4ea1d8da4ca667971f2e233f5cdc50e1a8f076a5def51d96e2df18e166e185bde9f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\0f5007522459c86e95ffcc62f32308f1_4304acb9-c3f6-452a-9860-eb4e85d38d4e
Filesize1KB
MD5049f4849240ae78db7a5fc25e181c818
SHA1b4b99c5ddf701ca3bdb789134569f2d378d032bf
SHA25684d662dba36193619da408bcce39ff7efc6c288b4fd5490023750062328051da
SHA512289d8b5b10286160531917f960d20f86d8f509a6268cc36921b98927462c3f0748c01ebe8c09c8fe602c7cb00be5e6446c6419e17f0295e45afdab41c30a429d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\0f5007522459c86e95ffcc62f32308f1_4304acb9-c3f6-452a-9860-eb4e85d38d4e
Filesize1KB
MD501467e34c9d70d0dfa204896605291ec
SHA142f927eeb689b511253a6cd855505d2b2e3b56ea
SHA256e63450c45b3ef09b7928d99061e969b0223a00c0c7e6c4cf03b5b124e92bc748
SHA5125fb12cff55ecf3c626afc6a9be693fba4b222f753f18395e117756f56588f3b74564fa2fb26748161df0dd845ca5eaab3f31b8385e34341329a5d86197b0d0f5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\0f5007522459c86e95ffcc62f32308f1_4304acb9-c3f6-452a-9860-eb4e85d38d4e
Filesize1KB
MD5399e1863e3a84fff50b203ab7fe14634
SHA1638c47ac8538c705ea90af8483b5f9aa3aacb71f
SHA2569c65cda8f7840c079e92cac432a0990b7e6bcbcf3f90cb5d911b6202ffb7e8a4
SHA51219d6cb4d3b67973db5cb41251953751588bacfe57d942d5eab66ba9fba716b689bb7a784a4fc0d6322d43e334f870d0674d10fa62489029ef1e898a0a5432d81