Overview
overview
10Static
static
100811cf7c27...de.exe
windows7-x64
90811cf7c27...de.exe
windows10-2004-x64
90dd0b31f05...24.exe
windows7-x64
70dd0b31f05...24.exe
windows10-2004-x64
71ad888606f...e0.exe
windows7-x64
31ad888606f...e0.exe
windows10-2004-x64
31c77a07e45...95.exe
windows7-x64
101c77a07e45...95.exe
windows10-2004-x64
1023f1c183af...bc.exe
windows7-x64
1023f1c183af...bc.exe
windows10-2004-x64
1038e891599d...90.exe
windows7-x64
1038e891599d...90.exe
windows10-2004-x64
103a13e092e9...db.exe
windows7-x64
43a13e092e9...db.exe
windows10-2004-x64
43b9dabd99d...82.exe
windows7-x64
33b9dabd99d...82.exe
windows10-2004-x64
358fe9776f3...06.exe
windows7-x64
1058fe9776f3...06.exe
windows10-2004-x64
105ab93bd422...11.exe
windows7-x64
35ab93bd422...11.exe
windows10-2004-x64
36b06c25fc6...43.exe
windows7-x64
106b06c25fc6...43.exe
windows10-2004-x64
106cc8001c9b...07.exe
windows7-x64
16cc8001c9b...07.exe
windows10-2004-x64
173ca5dd6d4...3f.exe
windows7-x64
1073ca5dd6d4...3f.exe
windows10-2004-x64
107b931d48ea...f0.exe
windows7-x64
107b931d48ea...f0.exe
windows10-2004-x64
107d6892645b...0f.exe
windows7-x64
107d6892645b...0f.exe
windows10-2004-x64
109036aeb570...7e.exe
windows7-x64
39036aeb570...7e.exe
windows10-2004-x64
3Analysis
-
max time kernel
141s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 09:49
Behavioral task
behavioral1
Sample
0811cf7c2702af79720305f03bb4945d63bd4052d4d6df4aa4cf8e6418e5d9de.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0811cf7c2702af79720305f03bb4945d63bd4052d4d6df4aa4cf8e6418e5d9de.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
0dd0b31f05bd8036791494372275f393714ac18bae0f8d26a808387a0fcfe224.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
0dd0b31f05bd8036791494372275f393714ac18bae0f8d26a808387a0fcfe224.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
1ad888606f448d0d04c37ba11348b4c7d06f22b1cb3e8c217a21a5674bf29ce0.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
1ad888606f448d0d04c37ba11348b4c7d06f22b1cb3e8c217a21a5674bf29ce0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
1c77a07e45b4f3e7f2b756c76df58a9d0f78785aa0f9e154074503398203c695.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
1c77a07e45b4f3e7f2b756c76df58a9d0f78785aa0f9e154074503398203c695.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
23f1c183af6a0322746465beeb83e79c30ba8f497cd52d60e2ed544bb7b39ebc.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
23f1c183af6a0322746465beeb83e79c30ba8f497cd52d60e2ed544bb7b39ebc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
38e891599dad5b84356bad13b154ef7e26bb07aa651809a00369e52a54adc890.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
38e891599dad5b84356bad13b154ef7e26bb07aa651809a00369e52a54adc890.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
3a13e092e9c857702ad930dbd32ff7e4819151b0eab88be26d0229d95a74b6db.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
3a13e092e9c857702ad930dbd32ff7e4819151b0eab88be26d0229d95a74b6db.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
3b9dabd99dc58a5242616cb6d1d876bca3046119a9b150c7d7868bf02202ea82.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
3b9dabd99dc58a5242616cb6d1d876bca3046119a9b150c7d7868bf02202ea82.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
58fe9776f33628fd965d1bcc442ec8dc5bfae0c648dcaec400f6090633484806.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
58fe9776f33628fd965d1bcc442ec8dc5bfae0c648dcaec400f6090633484806.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
5ab93bd4225586706037be1870f84d4bd124b38df01f78de5648e3e0f30b8911.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
5ab93bd4225586706037be1870f84d4bd124b38df01f78de5648e3e0f30b8911.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
6b06c25fc6181adf110e8109550698897836b5c429fe9b013b2e51a3abc05343.exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
6b06c25fc6181adf110e8109550698897836b5c429fe9b013b2e51a3abc05343.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
6cc8001c9b61f55dc390743a9a6adfe2de01efd983f68599b288d39d3bfb7207.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
6cc8001c9b61f55dc390743a9a6adfe2de01efd983f68599b288d39d3bfb7207.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
73ca5dd6d49b4c296ee1304aaac2e5fde01156800b538354fd27366df5b9323f.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
73ca5dd6d49b4c296ee1304aaac2e5fde01156800b538354fd27366df5b9323f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
7b931d48eafa703a99ca7f104daf9a7343b6f1161d49073b86f5a4700864d3f0.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
7b931d48eafa703a99ca7f104daf9a7343b6f1161d49073b86f5a4700864d3f0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
7d6892645bc5ba581b2fff986b3e9371dd7298bab6aac890c99f80c8b1d78f0f.exe
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
7d6892645bc5ba581b2fff986b3e9371dd7298bab6aac890c99f80c8b1d78f0f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
9036aeb570b22497c0f937e7edcef624800426011f0193a2b78c7f124e3a4c7e.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
9036aeb570b22497c0f937e7edcef624800426011f0193a2b78c7f124e3a4c7e.exe
Resource
win10v2004-20241007-en
General
-
Target
38e891599dad5b84356bad13b154ef7e26bb07aa651809a00369e52a54adc890.exe
-
Size
265KB
-
MD5
048df8f057b4ec78233640a09dd80e9b
-
SHA1
de16d030b3f5b067e5663eb1d75d2498c00d6817
-
SHA256
38e891599dad5b84356bad13b154ef7e26bb07aa651809a00369e52a54adc890
-
SHA512
d0cd4ce4c9d930866e269d9f44d44f79d24811d47cc700433c3611a287585b72fdc6d0ab38d07a1c3b76533d5ffd7756248d5ef68b7fe5c5218d631521d5e1b8
-
SSDEEP
3072:4OUEH7tRFNhHm/4FBVlhmhvXsk/GYtnkAtc3MmJNz7YaoXryNnv0uLT+K/5XK3mL:B7t9hpHlIt/GYiJV7Yaq2nvNLT7/I3m
Malware Config
Extracted
gozi
-
build
217161
Extracted
gozi
3170
oozoniteco.com
cetalischi.com
duvensteut.com
-
build
217161
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Gozi family
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEIEXPLORE.EXE38e891599dad5b84356bad13b154ef7e26bb07aa651809a00369e52a54adc890.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38e891599dad5b84356bad13b154ef7e26bb07aa651809a00369e52a54adc890.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEdescription ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30faebc4b140db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{278055B1-ACA5-11EF-BB15-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000056219a954c11b1c4081c8963f47059bae9babbfca1eecf914da6337f1df00248000000000e800000000200002000000024792dd983095c1bc9d6557eaa2b34cec0021702ccb7d7f2b74368f1eb68a4ce20000000ccac352bea8b2a40fd2eb74b3e16139b6d20d8c667215932bc0df58edd92adc540000000b09fa86c6e0e8be367e4b84770cc93c5ecb5cf6276dc24517c9d5e5780af41a817c5fea40627a57ef83f594ef5a9977bc9c24b6191c7632ab662941e5ae4a74e iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED714C31-ACA4-11EF-BB15-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exepid Process 2604 iexplore.exe 772 iexplore.exe 2668 iexplore.exe 1916 iexplore.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
iexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEpid Process 2604 iexplore.exe 2604 iexplore.exe 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 772 iexplore.exe 772 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2668 iexplore.exe 2668 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 1916 iexplore.exe 1916 iexplore.exe 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exedescription pid Process procid_target PID 2604 wrote to memory of 2628 2604 iexplore.exe 32 PID 2604 wrote to memory of 2628 2604 iexplore.exe 32 PID 2604 wrote to memory of 2628 2604 iexplore.exe 32 PID 2604 wrote to memory of 2628 2604 iexplore.exe 32 PID 2604 wrote to memory of 1948 2604 iexplore.exe 35 PID 2604 wrote to memory of 1948 2604 iexplore.exe 35 PID 2604 wrote to memory of 1948 2604 iexplore.exe 35 PID 2604 wrote to memory of 1948 2604 iexplore.exe 35 PID 772 wrote to memory of 2484 772 iexplore.exe 37 PID 772 wrote to memory of 2484 772 iexplore.exe 37 PID 772 wrote to memory of 2484 772 iexplore.exe 37 PID 772 wrote to memory of 2484 772 iexplore.exe 37 PID 2668 wrote to memory of 2772 2668 iexplore.exe 40 PID 2668 wrote to memory of 2772 2668 iexplore.exe 40 PID 2668 wrote to memory of 2772 2668 iexplore.exe 40 PID 2668 wrote to memory of 2772 2668 iexplore.exe 40 PID 1916 wrote to memory of 1408 1916 iexplore.exe 43 PID 1916 wrote to memory of 1408 1916 iexplore.exe 43 PID 1916 wrote to memory of 1408 1916 iexplore.exe 43 PID 1916 wrote to memory of 1408 1916 iexplore.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\38e891599dad5b84356bad13b154ef7e26bb07aa651809a00369e52a54adc890.exe"C:\Users\Admin\AppData\Local\Temp\38e891599dad5b84356bad13b154ef7e26bb07aa651809a00369e52a54adc890.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2700
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2628
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:275469 /prefetch:22⤵PID:1948
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:772 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2484
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e8d76bc5bd9095b6e81b3e8927e59ab
SHA1a75859496a7f092f33c1a3216f5820175754cc45
SHA25643a858fcdc8fd1996991138535d73c980a65c4df717412cf0d2e727eef515fb2
SHA5123332aa0baafc203ef6eaf5d3c4159c5269ad25232427961d0673218d5c9d6f35a3ab6ba3b924d398d464f4fdc7f6aaf02aaf32a0f56a46e53e63ce7ec7c36c04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cfa4eb3063076a15f5fd9f5a397ba64
SHA1678e8aba118c504e57db65c5d5d16055133864da
SHA25601fff70b1933d03b47d46b5fb8a2f1cdb0c9be39ce6c187c66cfec5514ef7350
SHA5127d0fc7609776c71bae503f6cbce2f4aeae502b611804d5fe8433ad15ec6744a2986fceeebcbcdfd3bb5b976ab6b9bde931ac94fddd96c567ef3181dd1ac67e3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b3722fc27e1b54ab3f2d71ced9270ae
SHA178c5e93e0225cb8f3148696241c859172abdb6f2
SHA256b737f8d410ad1bce2be337a45cae531a0d77516889711881c69f3fcf94f7e21b
SHA512d458d0ec322eac1a224f54ac7e66f1796f6bd462e4955871f6f54c06b4d3877581382d4dbdd8da0fa5d219bc99f78985b214223f95184b12e5d3fcdadde26846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573273ee1cd249814f424e3c2afabf0cf
SHA1a6d6c51fad9384576f79a42c5a23841663bc160f
SHA256f8360dacd4db61dfbc2585fb20094e16a99bcc16efa0e6a96e167a9ac6c20b4b
SHA51280afa57ccae2979cf8b7162343588c7cc1faa49cba602184174d9741cd4ccfe3e090f0a3a1567a80711e6d1db5d3aeb6e15611e92e80614e51e384bcfbc470f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595abf397f32e3928649027e3d5154fc3
SHA118ada0cc5ddcba0d748f127927c40b2e920af5f9
SHA2561d777469c28657b57e2e8032206a247b1778fe3258a2053a75f13698f66a806c
SHA5129ce71a891bbb1e6c602a81769ac8b50858341773dcb54bb4813172f12ba8b5657728b0b5dd7a69ae5beabf8d395be8812d9ab4b104bbee14fd0f1c74e4b0b812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6c109a13e4ca57e6813000bb34eb3ad
SHA1aced851aadca723980ed2b25d1c6db04a9f9bf21
SHA25636575a5598beb963676a923e5a0a9346536cc5368ce6fc391ea5b5ff6c8ff2ba
SHA512f25089184e40a5423d6b5223892909ae70655f85dc0962c0da2976e305940f4310710564f6a15819b29d819202dcfa66b52400eed9cbf555816c52d4142659cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5128433f18b930ec4383a5846c9d268e4
SHA198334c3bae561dc633c1b23698974a0b45de34a1
SHA2561ddf4942408141952e89511d49373fab2a5d5837ba358d3de0cddde4ca9edd11
SHA51238edf5006ec02fd81ed5018048f0e8fbb2ef5ede940ebc1405e7e0f01cc496998d5758fa7878600965ed08194c9301e4106da4798a156974b8cc18a2722d74c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba58dec4ae75444e68a23a8848729b44
SHA13f164750f20742810bd8dfeb42f9975c348be721
SHA256b50885d555a400c0ca8a719758085a66e330c35ba785ab6b8bff62a9895334fe
SHA512b55d92d7274d53c8ad58d6d8b674f068dc3dd2186b6640359d3fd06282960130deb0ac1608eed649fd3e642c850e8dcc51de8765dbd743ceba3609f64c3b28ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd0ea38f8cca6b08bc2dc2a52cab3aab
SHA182287837a4022511622121c1741a1c34ca097510
SHA256a912fd2182179cf7aa7ad4df11a584d2415f763f2fdcb2cc636fdbc6d8785612
SHA51279a64c6f5c219d8bd930a9f51740890cebd9692448240c58fcd2641f47f1df091e870b56422c2ef865a735b59fb569dac6b97436dfed05c3144955f70cc218b5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
16KB
MD5d53f1d66507645b143976c7669bf263a
SHA17134eb33010b2310841f8624c8908eb62c5ee118
SHA256d7b816ab830cff7531eedab5e92d759d8984b6962147e878eeb7a2b8810a2264
SHA5121f7aca3a15aa7aada6894a4aba65f72fc22b602bb032ac2d94ee07e41c2ae76d3908a1948fdaefe80d84cd5cfd208fdf18233817261446e1b7493fdfe53b16fa