Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnit.exe
Resource
win7-20240903-en
General
-
Target
2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnit.exe
-
Size
340KB
-
MD5
16f607f50c71eef0d907a0ddef51485e
-
SHA1
de1506f087ff03dab72c0a68157c5e9fadbf53e2
-
SHA256
49eb3d77a83f3494b5933b60ce11ab6075b8d6a2674419d0373e4db4b393d6f4
-
SHA512
c1bcb48f1a72eb4dba8c5a8a4e59a5110eee13be08851d3939274d48f93e6b8a3259cd1b1f56601f45ad22b3917a69e7e126092e95a50b540687ddff7f21e617
-
SSDEEP
6144:u5FFvya+l8bhG88U5Q4BfbQg7Iuxdu0ZeGbfUTpYDDmu/+3fb7:sbya+l8b/5lEg7PvAG+pG/Y7
Malware Config
Extracted
emotet
Epoch1
219.92.13.25:80
91.236.4.234:443
192.241.143.52:8080
186.3.232.68:80
192.241.146.84:8080
12.162.84.2:8080
50.28.51.143:8080
221.133.46.86:443
185.94.252.27:443
114.109.179.60:80
186.33.141.88:80
172.104.169.32:8080
184.57.130.8:80
177.139.131.143:443
77.55.211.77:8080
81.169.202.3:443
72.47.248.48:7080
212.71.237.140:8080
190.229.148.144:80
178.79.163.131:8080
118.69.71.14:80
170.81.48.2:80
61.92.159.208:8080
113.190.254.245:80
111.67.12.221:8080
177.72.13.80:80
80.249.176.206:80
2.47.112.152:80
83.169.21.32:7080
149.62.173.247:8080
190.181.235.46:80
201.213.32.59:80
190.17.195.202:80
190.147.137.153:443
5.196.35.138:7080
68.183.190.199:8080
46.214.11.172:80
175.114.178.83:443
104.131.41.185:8080
177.66.190.130:80
203.25.159.3:8080
190.6.193.152:8080
70.32.84.74:8080
45.161.242.102:80
204.225.249.100:7080
70.32.115.157:8080
185.94.252.12:80
77.90.136.129:8080
207.255.37.143:80
91.83.93.124:7080
82.196.15.205:8080
104.131.103.37:8080
94.176.234.118:443
187.51.47.26:80
187.162.248.237:80
202.62.39.111:80
190.163.1.31:8080
143.0.87.101:80
104.236.161.64:8080
185.94.252.13:443
46.28.111.142:7080
181.31.211.181:80
Signatures
-
Emotet family
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2156 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnitmgr.exe 2656 shfoldermgr.exe -
Loads dropped DLL 4 IoCs
pid Process 2436 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnit.exe 2436 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnit.exe 2720 shfolder.exe 2720 shfolder.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\shfolder\shfoldermgr.exe shfolder.exe -
resource yara_rule behavioral1/files/0x0007000000012101-2.dat upx behavioral1/memory/2156-10-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2156-14-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2656-31-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2656-35-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2656-33-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2156-40-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnitmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shfolder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shfoldermgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "447481029" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B00C5AF1-FB06-11EF-9C86-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B00EF301-FB06-11EF-9C86-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff5600000000000000dc04000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff6f00000019000000f50400007e020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2156 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnitmgr.exe 2156 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnitmgr.exe 2156 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnitmgr.exe 2156 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnitmgr.exe 2156 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnitmgr.exe 2156 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnitmgr.exe 2156 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnitmgr.exe 2156 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnitmgr.exe 2656 shfoldermgr.exe 2656 shfoldermgr.exe 2656 shfoldermgr.exe 2656 shfoldermgr.exe 2656 shfoldermgr.exe 2656 shfoldermgr.exe 2656 shfoldermgr.exe 2656 shfoldermgr.exe 2720 shfolder.exe 2720 shfolder.exe 2720 shfolder.exe 2720 shfolder.exe 2720 shfolder.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2436 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnit.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2156 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnitmgr.exe Token: SeDebugPrivilege 2656 shfoldermgr.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1916 iexplore.exe 1820 iexplore.exe 1820 iexplore.exe 1820 iexplore.exe -
Suspicious use of SetWindowsHookEx 22 IoCs
pid Process 2436 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnit.exe 2436 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnit.exe 1916 iexplore.exe 1916 iexplore.exe 1820 iexplore.exe 1820 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2720 shfolder.exe 2720 shfolder.exe 1820 iexplore.exe 1820 iexplore.exe 1820 iexplore.exe 1820 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 952 IEXPLORE.EXE 952 IEXPLORE.EXE 952 IEXPLORE.EXE 952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2156 2436 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnit.exe 30 PID 2436 wrote to memory of 2156 2436 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnit.exe 30 PID 2436 wrote to memory of 2156 2436 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnit.exe 30 PID 2436 wrote to memory of 2156 2436 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnit.exe 30 PID 2156 wrote to memory of 1820 2156 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnitmgr.exe 31 PID 2156 wrote to memory of 1820 2156 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnitmgr.exe 31 PID 2156 wrote to memory of 1820 2156 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnitmgr.exe 31 PID 2156 wrote to memory of 1820 2156 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnitmgr.exe 31 PID 2156 wrote to memory of 1916 2156 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnitmgr.exe 32 PID 2156 wrote to memory of 1916 2156 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnitmgr.exe 32 PID 2156 wrote to memory of 1916 2156 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnitmgr.exe 32 PID 2156 wrote to memory of 1916 2156 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnitmgr.exe 32 PID 1916 wrote to memory of 2200 1916 iexplore.exe 33 PID 1916 wrote to memory of 2200 1916 iexplore.exe 33 PID 1916 wrote to memory of 2200 1916 iexplore.exe 33 PID 1916 wrote to memory of 2200 1916 iexplore.exe 33 PID 1820 wrote to memory of 2740 1820 iexplore.exe 34 PID 1820 wrote to memory of 2740 1820 iexplore.exe 34 PID 1820 wrote to memory of 2740 1820 iexplore.exe 34 PID 1820 wrote to memory of 2740 1820 iexplore.exe 34 PID 2436 wrote to memory of 2720 2436 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnit.exe 35 PID 2436 wrote to memory of 2720 2436 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnit.exe 35 PID 2436 wrote to memory of 2720 2436 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnit.exe 35 PID 2436 wrote to memory of 2720 2436 2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnit.exe 35 PID 2720 wrote to memory of 2656 2720 shfolder.exe 36 PID 2720 wrote to memory of 2656 2720 shfolder.exe 36 PID 2720 wrote to memory of 2656 2720 shfolder.exe 36 PID 2720 wrote to memory of 2656 2720 shfolder.exe 36 PID 2656 wrote to memory of 1000 2656 shfoldermgr.exe 37 PID 2656 wrote to memory of 1000 2656 shfoldermgr.exe 37 PID 2656 wrote to memory of 1000 2656 shfoldermgr.exe 37 PID 2656 wrote to memory of 1000 2656 shfoldermgr.exe 37 PID 2656 wrote to memory of 1592 2656 shfoldermgr.exe 38 PID 2656 wrote to memory of 1592 2656 shfoldermgr.exe 38 PID 2656 wrote to memory of 1592 2656 shfoldermgr.exe 38 PID 2656 wrote to memory of 1592 2656 shfoldermgr.exe 38 PID 1820 wrote to memory of 2920 1820 iexplore.exe 39 PID 1820 wrote to memory of 2920 1820 iexplore.exe 39 PID 1820 wrote to memory of 2920 1820 iexplore.exe 39 PID 1820 wrote to memory of 2920 1820 iexplore.exe 39 PID 1820 wrote to memory of 952 1820 iexplore.exe 40 PID 1820 wrote to memory of 952 1820 iexplore.exe 40 PID 1820 wrote to memory of 952 1820 iexplore.exe 40 PID 1820 wrote to memory of 952 1820 iexplore.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnit.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnit.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnitmgr.exeC:\Users\Admin\AppData\Local\Temp\2025-03-07_16f607f50c71eef0d907a0ddef51485e_icedid_ramnitmgr.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275464 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:668676 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:952
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2200
-
-
-
-
C:\Windows\SysWOW64\shfolder\shfolder.exe"C:\Windows\SysWOW64\shfolder\shfolder.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\shfolder\shfoldermgr.exeC:\Windows\SysWOW64\shfolder\shfoldermgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1000
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1592
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56eea324500f79b0382dd951a39ee70a5
SHA156a8218651362fa64af495bb3383ecd990b98d29
SHA2563bdf219e3f18399e0557eae9274fcf7cf3cae6e235197139d0890b2efe03ce21
SHA512c187a74978eb51fba5fc2967b8217da7b868e62573087992c37956828e753c19e65e4138c5e82ad748884bad8d367f8de7c14455b35230018c98882d86c80809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dfe7e60ce30a2308352ec852b5cc6a3
SHA135e5ec468cb7468b2c576f5fbaf2aa4cd89f6f6c
SHA2565298fbc7e7e3d6738b8209dbd2bb136293535cbe0d27674864932728b140cd26
SHA5127c8fa24e53371904b148d367007b7976eb72ea57788e1c3bb34e2a18afb91dba7c8384c13d622ee32cd6d7ffae8844a8e20bd023e30c2ce808db64e3da7a378f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba98e17dc8debaa7c45a55cd714c0f86
SHA15f50d7a0a1500be8e3948dca734adc86572f7ea1
SHA25610e3acb80b55cc5f2c040d7be3d98f77a279173435b85527622a810f5ca7a74d
SHA512b0ce045740c6ff2974c4b5527110bfc38e235647a10466cbda5cc28e219ffeae2c02cb5d2d50c5012e89ae7fa341be28721455b12bb4f07dbb63823e235fc535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb7925f7283b6d9cf800a517a0e831e6
SHA1e13ee5638b9e25907595c07f0ed75634a69d71c5
SHA256f18eee6328ef60c7702c8ba5e100d6f89443ce55db0f2274ed5f853d6619422c
SHA5126aee549106d6edda1c7695bdb170bbd945d2205e03ee4ddbca0142e6e8815c73d656eccadc8f3d444338d8fe13daa5a8cd31c9ad06ab9bb49a6455a0811333f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acdfef29186589a4a4c84608dc91c344
SHA1fc19c702428b9a8d3f1c567b8e5398305abaa6a7
SHA2560890265baf8f0cc2721f6768b702000243a4a7755743ea0b6a6ed3227bbbed2d
SHA51284d1d3ccd4df25b2165eee6cc2c85f725e4c4113c83eae356232f95e6ae064d02ccf302b9005295945d3a932768fe17d4e213f49e5ecd06993be83dd5ca7ec60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519a05ada56bfca98855ae951c3a7a6f4
SHA1364e3cdb698a0b573fa53ab7b82024bae11bd693
SHA25671269e035505492469399578162e7fbb90b9be39831e9733ab5629468d8c14e0
SHA512ddaace356dc44bdc1ac25f8ca31a3157227a093bddc4f2647253b6bb07a8ccdd805e670b563f0314858d73ab6dcdbe22136cac60c93f459503e8c67498a11912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53193905156191194e6ffba0fcb8b65ac
SHA17e271a99b15716f8f8e815f33900703685d417c2
SHA256abf91c71450f55c4a1055476baa85c306f45369d0ea9edb93a081b53cb42e83f
SHA51268520d102a8803fca5edbfe7ce8d12e3135d6e968f237fea81c3bee11cd0c93592d33e77dfbdae8e7e919752dca011dec2a2e34dcc4bfa9bc7846491dad00e1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afb447e6fc3fa839a9f1721d4a2baff8
SHA14996a49f4759b5373012dd08a600a5210fa51c4b
SHA2568c3e7fe0d29b760d4954600a2101078b7530fc4ba71e6c185d8d254a4de42312
SHA512700d368d956d340db43ebd3192d90349960cff2e6a0547e91c8e716c0aa0f92c038cc5e4098c6c2dc18904fcee09979f73ac0cc8c6393b5f1dea7e57539a23b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562e7d3f2b9c39f212e0b4015f3fcf76a
SHA138edcd0af276d08c253001e00e1818db09857ac8
SHA256a251c7f6f1889969f96ffb76995e969ca4409415030d205a90cbdde5cdbefc07
SHA5129cc01b324fed13f8c4ab1faf1efbdfddbc2b7a7c0e30dec46c5b78274d04d1de716e664be931875b1561acfed19e00d6bd4c1d2147db2906d2edcd639a265a69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518591b6bf4b8b952830b26d1e97f1d8e
SHA10ad12653819d3abe3591e82201e4c005dbf56329
SHA256a2aa41c7041aa1ddebeb99dd15759e770985deac75afca15a7d504dbe363fa35
SHA5129decf3b53da76a6952adb3f1e9019712889f74000a7612679dd6e97f27de0e665e539b2108cb8ca377123349c51b74f7ade36237baed03a9609603da7c402254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c49c35aedd90fa7a17384232fb560124
SHA13bef659c6444959705cd182674ec7ab89ead7b91
SHA256c5f034817bf89067f3bff55382e256a41a39b357349b644d6c2bffbf4eab7ed1
SHA512f6e21fbb3384e02db6450b241e33406bf87fa4cf22c7d7ed4c095a08bd7d6663772718a9a7b4f91e1967314dac57f4e50d73a7203298024d9a46fb93d8b69b0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d54c14ce56d5901d30e9bf1008a3540
SHA17b13e73e12b525088687fc67ff528e32ef064c76
SHA25636e378bb496434d5c960128b630f297ddd47da1c5c98393f5ea3836c5035ed5b
SHA5120a6275a7a8ca994c92df82123244f9d43333a65addd2a1ea5efa9663fb594c3fb8c6a3d7b98a2e58260be21f76ba56458fcf9400dd24e02ce92720190d8a70f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5114be228611ea9b288f9982f9491e2ca
SHA1beda4d250facd9554d81d6aff8e7624d996589d6
SHA25661586b5222e2dce8ce0c5199421baa8b6de5ed004c18f031aaf83570310a361a
SHA512d534fcc27d6d96c731f76a6da07baeb20f92547ba3153252be8f7d7978b10ad640d65798560b131d5a4a006584710686981f01f0f7bea9bf75005fc7822fa693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54803441e7ed91acc947e0043b090c62e
SHA192c9d068e864f675590ab37af119b288e6d94568
SHA2564a0650e785c8cf24e3de3e53c5e7df4d1e14c4a66f08b61845cd8b811db0c198
SHA5125ac5862514dcf361a836d24a8f9334d38b50ca0e7fa1930ad06a8f648ab30ed8390dfa454e3c9fc087a739018174cc04ae5280dc28cfae8a6c1eab425d9181a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535338449fafaad0b4078ec6288fe6c9f
SHA144a92e9285ae34d7670a5463bca6e70bb29aca21
SHA256ae3e613a3cdb9081606be4ec85c3c7dfa1a5911370a03629781f1e572fca42ec
SHA512e0b580c864ecbccdab889bda997e952834bb1199d74b96cb0bfcfe4b7a60139255dba664c1035ae67a7df458193a07a39da8a07b2c50c1a7ce6a765520744d8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4cfdf3bcfa6ad0b5deb7e0cbd6a2b16
SHA1fd9d3c25c8baecf80fb22c0c3db7ef77453597c6
SHA2565cd18faa0d99657cf2d55a838aef8ffffb7967e8ca99b3e88e7c5a94fcd24575
SHA512dd522b0d1cc72134645cb3a4eafba5e33f418f7d34b70ec855381b89e3169cc63d3de4f282c196eb9c951e53b2b75cd304ff29360dfa277ab85a1e3f18e1d44b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5726d46bef2353a7655d0e236d1ad5dd6
SHA1be17b83df99cfa04e70013258b45093c6d3cfd55
SHA25685249a64461ab8b80e2af55cc11241902c7705d9684abc88af5495d3b2cd149d
SHA512566a890a8c39ddcd0eac96b3140590a0ee9cb76a2466d1adccce16c120d8f6faa7b6aeb71140cf5361335107af225e2acd943cef06e5a8e38751ba6225fcd93b
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B00C5AF1-FB06-11EF-9C86-EA7747D117E6}.dat
Filesize5KB
MD5b3c800b385e7d166705553c211e1c86b
SHA10f7cade4d4191e7b50501199f4c84e448c16dd3c
SHA256601b948288acfb058f2488c62001bcc11c4c8c69d440d2d0965820254fdbf1a9
SHA512470e1a4c21b7f048006359d2ca98a7a96dcbf1a201ddae75ae2c5fc379316e2455c1025fe8a359a3910d72ec94d2ce75e107778acab5e883dbd047576bc1cd2e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
105KB
MD5d5ca6e1f080abc64bbb11e098acbeabb
SHA11849634bf5a65e1baddddd4452c99dfa003e2647
SHA25630193b5ccf8a1834eac3502ef165350ab74b107451145f3d2937fdf24b9eceae
SHA512aa57ce51de38af6212d7339c4baac543a54b0f527621b0ef9e78eca5e5699e8508a154f54f8ac04135527d8417275eeee72a502a362547575699330cc756b161