Overview
overview
9Static
static
830bc4934d7...f0.exe
windows7-x64
630bc4934d7...f0.exe
windows10-2004-x64
6338fdf3626...13.exe
windows7-x64
1338fdf3626...13.exe
windows10-2004-x64
1342933cb4c...20.exe
windows7-x64
7342933cb4c...20.exe
windows10-2004-x64
9343ace5874...03.exe
windows7-x64
3343ace5874...03.exe
windows10-2004-x64
834818CE171...49.dll
windows7-x64
834818CE171...49.dll
windows10-2004-x64
8360390_crypt.exe
windows7-x64
1360390_crypt.exe
windows10-2004-x64
3360390_tree.cmd
windows7-x64
7360390_tree.cmd
windows10-2004-x64
73896f8a370...e_.exe
windows7-x64
83896f8a370...e_.exe
windows10-2004-x64
73a061ee07d...8c.dll
windows7-x64
33a061ee07d...8c.dll
windows10-2004-x64
33af4fa2bff...d1.dll
windows7-x64
33af4fa2bff...d1.dll
windows10-2004-x64
33bb691982d...21.exe
windows7-x64
13bb691982d...21.exe
windows10-2004-x64
93e3f980ab6...95.exe
windows7-x64
73e3f980ab6...95.exe
windows10-2004-x64
73e3f980ab6...26.exe
windows7-x64
73e3f980ab6...26.exe
windows10-2004-x64
33e75e8238a..._2.exe
windows7-x64
63e75e8238a..._2.exe
windows10-2004-x64
6400cad56ff...9a.exe
windows7-x64
9400cad56ff...9a.exe
windows10-2004-x64
940b3cb2a21...0c.exe
windows7-x64
740b3cb2a21...0c.exe
windows10-2004-x64
9Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 16:52
Behavioral task
behavioral1
Sample
30bc4934d7e29c8c4c4c9be0510fc7558fddf8db666a0343784c5cf1587b3af0.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
30bc4934d7e29c8c4c4c9be0510fc7558fddf8db666a0343784c5cf1587b3af0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
338fdf3626aa4a48a5972f291aacf3d6172dd920fe16ac4da4dd6c5b999d2f13.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
338fdf3626aa4a48a5972f291aacf3d6172dd920fe16ac4da4dd6c5b999d2f13.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
342933cb4cbb31a2c30ac1733afc318a6e5cd0226160a59197686d635ec71b20.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
342933cb4cbb31a2c30ac1733afc318a6e5cd0226160a59197686d635ec71b20.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
343ace5874a5854858e11e6c196007bffc045717ed29db9b03f23d01568e8303.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
343ace5874a5854858e11e6c196007bffc045717ed29db9b03f23d01568e8303.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
34818CE171EA150B91429AC1DD6FBE49.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
34818CE171EA150B91429AC1DD6FBE49.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
360390_crypt.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
360390_crypt.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
360390_tree.cmd
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
360390_tree.cmd
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
3896f8a37034429e9784d767765d85ef6dcde105320568516fac4e31400514db.exe_.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
3896f8a37034429e9784d767765d85ef6dcde105320568516fac4e31400514db.exe_.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral17
Sample
3a061ee07d87a6bb13e613e000e9f685cbffb96bd7024a9e7b4cb0be9a4af38c.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
3a061ee07d87a6bb13e613e000e9f685cbffb96bd7024a9e7b4cb0be9a4af38c.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
3af4fa2bffaab37fd557ae8146ae0a29ba0faf6d99ad8a1a8d5bf598ac9a23d1.dll
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
3af4fa2bffaab37fd557ae8146ae0a29ba0faf6d99ad8a1a8d5bf598ac9a23d1.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
3bb691982de416a7a4e57b91211e80bea82dcca7b4bdbf25c0c80451dc138421.exe
Resource
win7-20250207-en
Behavioral task
behavioral22
Sample
3bb691982de416a7a4e57b91211e80bea82dcca7b4bdbf25c0c80451dc138421.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral23
Sample
3e3f980ab668ccde6aafee60ce16e3c35cd91e9b59bff20ce1615d5fb362a458_Dumped_TDS=4FBA3695.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
3e3f980ab668ccde6aafee60ce16e3c35cd91e9b59bff20ce1615d5fb362a458_Dumped_TDS=4FBA3695.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
3e3f980ab668ccde6aafee60ce16e3c35cd91e9b59bff20ce1615d5fb362a458_TDS=4FBADA26.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
3e3f980ab668ccde6aafee60ce16e3c35cd91e9b59bff20ce1615d5fb362a458_TDS=4FBADA26.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
3e75e8238a6bbd8817164658696198af_72889f61171de37d6b4d59016c55ec52__2.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
3e75e8238a6bbd8817164658696198af_72889f61171de37d6b4d59016c55ec52__2.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral29
Sample
400cad56ff3d210346cf6c4795aeb607e5b211b3dc4a8421b9437621c254239a.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
400cad56ff3d210346cf6c4795aeb607e5b211b3dc4a8421b9437621c254239a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
40b3cb2a210fafdaabdebefe1430862bd1192a80fcde84f51ceb387136d1410c.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
40b3cb2a210fafdaabdebefe1430862bd1192a80fcde84f51ceb387136d1410c.exe
Resource
win10v2004-20250314-en
General
-
Target
34818CE171EA150B91429AC1DD6FBE49.dll
-
Size
170KB
-
MD5
34818ce171ea150b91429ac1dd6fbe49
-
SHA1
765f7cea9ae6e126181e5a78b897304913530d4d
-
SHA256
502386cb2288ce85af522da55916b5a05c71d9a32a80cec396bc4cdd0e0ac665
-
SHA512
e44b009eef9710787ddf63d5038e15112969ef5ac952520f772b5ab78dfe57c42f7562044642f573c9480c76569ef9a7912cc5cd1b0472e4d61c25e79a03bfb0
-
SSDEEP
3072:xUiScf7Taa44mVg6zMe4sfPZfE8dreM9aSW3OKojVbc7n4CRWLvSFlp6+qvv1:xUUm4mG6zwQLaM9aKjRg0SLlK1
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\PROGRA~3\NOTEPAD.EXE-x.txt notepad.exe File created C:\PROGRA~3\RUNDLL32.EXE-x.txt rundll32.exe File opened for modification C:\PROGRA~3\RUNDLL32.EXE-x.txt rundll32.exe File created C:\PROGRA~3\NOTEPAD.EXE-x.txt notepad.exe File opened for modification C:\PROGRA~3\NOTEPAD.EXE-x.txt notepad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50af63fa01a0db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0CBE23B1-0BF5-11F0-9C5B-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ddd4f8b92c61254db00d9c7399453fed00000000020000000000106600000001000020000000b16df42023a024ea16e104d4b434fcef8858c38b5f9e48107286b387d9acba7c000000000e80000000020000200000005b6e94c60a16a7bc915e9bbcaa6795fa53d14414295b62ce2df5d9bd1ab8c26320000000cd26b1b4e159849aefc6717a4a371daffe787ff908fc0637a81a6282b0d2a9dd400000006f0c58995a48b9d583e5bcdbf679973884c16cea9e3040f9f7a31154fdf62603cc489eaaeb8a1275e1b64b26706bc7c600ae91a6b75c1e6f70ffd8af7f5f0fe6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "449342622" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2244 rundll32.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 592 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe 2932 notepad.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 3004 iexplore.exe 3004 iexplore.exe 3004 iexplore.exe 3004 iexplore.exe 3004 iexplore.exe 3004 iexplore.exe 3004 iexplore.exe 3004 iexplore.exe 3004 iexplore.exe 3004 iexplore.exe 2860 ctfmon.exe 2860 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3004 iexplore.exe 3004 iexplore.exe 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2244 1316 rundll32.exe 30 PID 1316 wrote to memory of 2244 1316 rundll32.exe 30 PID 1316 wrote to memory of 2244 1316 rundll32.exe 30 PID 1316 wrote to memory of 2244 1316 rundll32.exe 30 PID 1316 wrote to memory of 2244 1316 rundll32.exe 30 PID 1316 wrote to memory of 2244 1316 rundll32.exe 30 PID 1316 wrote to memory of 2244 1316 rundll32.exe 30 PID 2244 wrote to memory of 2728 2244 rundll32.exe 31 PID 2244 wrote to memory of 2728 2244 rundll32.exe 31 PID 2244 wrote to memory of 2728 2244 rundll32.exe 31 PID 2244 wrote to memory of 2728 2244 rundll32.exe 31 PID 2244 wrote to memory of 2932 2244 rundll32.exe 32 PID 2244 wrote to memory of 2932 2244 rundll32.exe 32 PID 2244 wrote to memory of 2932 2244 rundll32.exe 32 PID 2244 wrote to memory of 2932 2244 rundll32.exe 32 PID 2784 wrote to memory of 2860 2784 explorer.exe 34 PID 2784 wrote to memory of 2860 2784 explorer.exe 34 PID 2784 wrote to memory of 2860 2784 explorer.exe 34 PID 2244 wrote to memory of 2932 2244 rundll32.exe 32 PID 3004 wrote to memory of 1216 3004 iexplore.exe 36 PID 3004 wrote to memory of 1216 3004 iexplore.exe 36 PID 3004 wrote to memory of 1216 3004 iexplore.exe 36 PID 3004 wrote to memory of 1216 3004 iexplore.exe 36 PID 2244 wrote to memory of 592 2244 rundll32.exe 37 PID 2244 wrote to memory of 592 2244 rundll32.exe 37 PID 2244 wrote to memory of 592 2244 rundll32.exe 37 PID 2244 wrote to memory of 592 2244 rundll32.exe 37 PID 2244 wrote to memory of 592 2244 rundll32.exe 37
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\34818CE171EA150B91429AC1DD6FBE49.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\34818CE171EA150B91429AC1DD6FBE49.dll,#12⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:592
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:2860
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3004 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
545B
MD53fd638e5c953ee30af01a3637e10f7d4
SHA1a7401136459e9957948cac9290ec74eeba87a99d
SHA256a968ec58762f8325e15a6aed0b2160f417104b19721ad2b04088854d0ef0028f
SHA512cb177ca588d5fc3aff6f54e4729b3284c50d15436204fa9e3155a4e0de314c6a19359d1c687014fc6959b81869ebe093e5e988aaeee7f2ac67bb9a088a06269f
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e58c7fada0c778c8b0cff3d68c7f74b
SHA14a59e17d726f7f009ecf7d2896ebcca5a472fe06
SHA25657924968aaa1f8aea91ae29c84838803f23956e45e09129bcaff6408e0422b68
SHA512fc0dafa3e803d1a5d5bc46c41d7194ec0b74db607ad021fa97794e0097140eea9d6475b58974a61bfd04ceb528226cedc654fd8912c6b52d2e6edd98d34314f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da53fa3a92cf6cbdcb3a3d5842dfc7fc
SHA1ef222517f9baa3173744e55beeb5c80c5ff3b5a6
SHA2561b5c970420078b26a6906da3dd297c709654ff657b3c642a5f02bbe33fae2206
SHA5124af6d984f773a4253c87d8a06f2355b2086c3e8252c67357baefd8c7c4b96c2574a4b93a72d34f67c91b5c9fd7efa26b3e43a269bc0f61ada305502164df6e16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ed8837b17e1ab21354c9a22c478b23a
SHA1d2539caa259b0306b50217390e95936ec08b8571
SHA256042c42873a87cddaae8b6bad84a9fa90b09129dd334a38dd1dec39b376cf8549
SHA512264f5096d5ea83b0de3710b00f43e65f0c06bb36a6094befe5cd5801ea81d2e1cce0ac151f75f871b286059b1b1be3db056c94d5e8afc12aadbf7c68c41ed364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566e70e529e5ec31584c55404156bf2ca
SHA12f1608987e8ed8a9e43dbdea414a0f72a172d2ca
SHA256d3d9722cf0e75e2f3ccbe57b716028b7bfd3ece85897c29833f4005efe7ade17
SHA512ecf2338574e184e27a37a02c6a5aa4bdcf6c802d6dbe03cdef65d6247b8694b6232eefb5e0dac434cb6d0972bf757ebabaae719da52c6c6fc36e9492ca7be09d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575e814a67f9d02bd45dff584a77828a9
SHA110209e647449d6d7008592c9346683102c920a0d
SHA2562f159f1083b2a0d6c7ddca19b6831a36a64bb7a453c900a72a5b4729dc608a03
SHA512555e27fea5ff9f5626c8c7bf32ce2170b7e5504f1aee85aec7b7068dcd7863e1f05634c5675fb9b430859c57539b70a228b2c2da210c4c0a0a82b12078259f51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ef1b990e844e49d6d43a0cc5c96f32e
SHA14f352d5a8381c6b1b87a1c7023a8894fd5dd8c2d
SHA256bf1d755402cec533c1ef303eda7decf0a0e67bb5fb7dd92000a4c166cc70a57d
SHA512453d90a4b33a0595e5e1b860efb73d9bb5ddd39b5f986735f2b935492aa632161cfdf191c244c3154ff1bc8e62026b017f36513b96b8da02979f4b312e656194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ab689fc44c43c24a505ddca58a117d0
SHA11cf6fe1d045fe33d63a7a70544631a276f5d47af
SHA2562d3c8db4f16781824a583c07516eb1027fe4ebc4092c6b0f0b2c5fae87d282e6
SHA5123768c3cdcf6823467526211b53a429f58069fc9636f6106d820f026b7d66991c0d024211a9832ce66190406417436afb2c6778eb303089b48e7844fd8c0f54d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b202fecfba2e3edb7e3d389786fdb51a
SHA12ee2968b271691a108f4c789006278808e4a72f7
SHA2561a831fd7e29eaab10ebcd563ff9c7b326ed9989ca3ed86440e088a644fb8d54b
SHA5120ab4e0585753e1ec1b44cb40b9fc67b08e8b5be45fbd4ba1c6e386505ab35c974915e6a228796651150c6fbe0ad2d4de66315951d5516a8fc91a4f672edaa8f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569a64b5839d2ba4f9011913e3de6da67
SHA1377c0772177c189f652cddfcd029955deda0763b
SHA256832ab78e7a746116572293245ce39b78c88edcc9d58cc202cf62d96b42e28437
SHA512ed498ad42391ed4bb3260f45ce6748aff8de93b7d43be503654400d962f2d8353916d6641e6394cba1ecca90429f40fb2f33ef0df1c067026175cc6ad5bfe5b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e9b12c9086eb7b5341b0da41a54f224
SHA15b079788e052aecf3881cc0e86d0a064ee1c5d8d
SHA2569a134408e9455cebcbb6e16e92749c7ddcbaa9462a38a212cb033842be79964f
SHA5120930ac795cf7c8a001b5a506999049b1a484e7e0fa4bd9aa10a2f076d8eb63156709993f6494812c747ef6ffd6db8edc7a6a04ae2f0d691a23a33e0115c2793a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b47f6e4974753eb92671b9e8f845761a
SHA1cba219000dda2b28850a22bae591b8fa77c83282
SHA25651316f31a89967605017cac2ab09a78458fd37149056b8657cc0b13d742773f1
SHA51203d94f96f34afa70509470c3de6cf9dc192a7944ef3b19c10cc1c85018bd309507489093204d6031e9233ac17fa4795f8af940a5cb4b2531eb40a51db82fbcba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5387c67c69debbfe88dcec823b89ca99b
SHA110d098f1023f4b5f66ad0be5d6a6562fe7b03895
SHA256c495a6fd3cde675879ad8b8e7f95e5ca2cff5ff6dec268c848d59353fdbd2021
SHA5121d643b7f7410d92885c57c610f7e084457736b5b198704aeaffd93595d6ee2bfade4089aabc844c14fce61fe4c09c661ae360db87e48ab87082659047420694f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b1aea010f2dac79207f7ec19b76da3e
SHA16bb77de5d3b9aa7dd50ccb0aa379623d8899cab6
SHA2564e3d9543ee88358ed189d7f07d5ba18dabe8e005de262d001a4262834234efea
SHA51232d6a3032845c447fef3fbf9a3e86dd5acd1f34fedd731101a4585ea06e2d8038a802769fab89100835fb6836b4c0d5e771c705932c9832374b0bd190d063c47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c63461e0ebc014929e7b7bc8ba246534
SHA179076937e1bfbc054704faf2c16164895a67ea29
SHA2567c6631c9edb34944c78f0c7cacea6a03de40b677d7a8b255cdbbfad2399dd4b2
SHA5123c0449119b17f70d8febf28a043d67f193d3bd879198c94e4875edbea9e25ec0a48b37defeefca1b0c03349a952aa50ff27be1b938618f71dd160275dae5a3fd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc