Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
23-09-2021 12:37
Static task
static1
Behavioral task
behavioral1
Sample
09876523456789.exe
Resource
win7-en-20210920
General
-
Target
09876523456789.exe
-
Size
926KB
-
MD5
b8cdebc24a5ab6241373ae3bcc7d3053
-
SHA1
bb17815265e215c6de61489aca8019bb5ae473e0
-
SHA256
5521410a48148459362ab36b0fad3e61b1ca9b674339476eac02381ffbc04aa2
-
SHA512
b57809010853fce4520d4f0a144c5827f07e0105da22814480472d2d147006712867fcaead42e3aabaf88592344dad2ddca9771a5a616a105253cb5cd8b949e8
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
09876523456789.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 09876523456789.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 8 IoCs
Processes:
09876523456789.exe09876523456789.exe 09876523456789.exe icsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 1116 09876523456789.exe 1620 09876523456789.exe 1200 09876523456789.exe 2028 icsys.icn.exe 288 explorer.exe 684 spoolsv.exe 616 svchost.exe 1048 spoolsv.exe -
Modifies Installed Components in the registry 2 TTPs
-
Loads dropped DLL 18 IoCs
Processes:
09876523456789.exe09876523456789.exe09876523456789.exe icsys.icn.exeexplorer.exespoolsv.exesvchost.exepid process 2008 09876523456789.exe 2008 09876523456789.exe 1116 09876523456789.exe 1620 09876523456789.exe 1620 09876523456789.exe 1116 09876523456789.exe 1116 09876523456789.exe 2028 icsys.icn.exe 2028 icsys.icn.exe 288 explorer.exe 288 explorer.exe 684 spoolsv.exe 684 spoolsv.exe 616 svchost.exe 616 svchost.exe 2008 09876523456789.exe 2008 09876523456789.exe 2008 09876523456789.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 checkip.dyndns.org 6 freegeoip.app 7 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
09876523456789.exedescription pid process target process PID 1620 set thread context of 1200 1620 09876523456789.exe 09876523456789.exe -
Drops file in Program Files directory 64 IoCs
Processes:
09876523456789.exedescription ioc process File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 09876523456789.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 09876523456789.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 09876523456789.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 09876523456789.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 09876523456789.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 09876523456789.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 09876523456789.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE 09876523456789.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 09876523456789.exe File opened for modification C:\PROGRA~3\PACKAG~1\{F4220~1\VC_RED~1.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 09876523456789.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 09876523456789.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 09876523456789.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 09876523456789.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 09876523456789.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 09876523456789.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 09876523456789.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 09876523456789.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 09876523456789.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe 09876523456789.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 09876523456789.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 09876523456789.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 09876523456789.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 09876523456789.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 09876523456789.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 09876523456789.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 09876523456789.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 09876523456789.exe -
Drops file in Windows directory 7 IoCs
Processes:
09876523456789.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exedescription ioc process File opened for modification C:\Windows\svchost.com 09876523456789.exe File opened for modification \??\c:\windows\system\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 14 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\3582-490\09876523456789.exe nsis_installer_2 \Users\Admin\AppData\Local\Temp\3582-490\09876523456789.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\3582-490\09876523456789.exe nsis_installer_2 \??\c:\users\admin\appdata\local\temp\3582-490\09876523456789.exe nsis_installer_2 \Users\Admin\AppData\Local\Temp\3582-490\09876523456789.exe nsis_installer_1 \Users\Admin\AppData\Local\Temp\3582-490\09876523456789.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\3582-490\09876523456789.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\3582-490\09876523456789.exe nsis_installer_2 \??\c:\users\admin\appdata\local\temp\3582-490\09876523456789.exe nsis_installer_1 \??\c:\users\admin\appdata\local\temp\3582-490\09876523456789.exe nsis_installer_2 \Users\Admin\AppData\Local\Temp\3582-490\09876523456789.exe nsis_installer_1 \Users\Admin\AppData\Local\Temp\3582-490\09876523456789.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\3582-490\09876523456789.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\3582-490\09876523456789.exe nsis_installer_2 -
Modifies registry class 1 IoCs
Processes:
09876523456789.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 09876523456789.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
icsys.icn.exeexplorer.exesvchost.exe09876523456789.exepid process 2028 icsys.icn.exe 288 explorer.exe 288 explorer.exe 288 explorer.exe 288 explorer.exe 616 svchost.exe 616 svchost.exe 616 svchost.exe 288 explorer.exe 616 svchost.exe 288 explorer.exe 616 svchost.exe 288 explorer.exe 288 explorer.exe 616 svchost.exe 288 explorer.exe 616 svchost.exe 616 svchost.exe 288 explorer.exe 288 explorer.exe 616 svchost.exe 616 svchost.exe 288 explorer.exe 616 svchost.exe 288 explorer.exe 288 explorer.exe 616 svchost.exe 616 svchost.exe 288 explorer.exe 616 svchost.exe 288 explorer.exe 616 svchost.exe 288 explorer.exe 288 explorer.exe 616 svchost.exe 616 svchost.exe 288 explorer.exe 288 explorer.exe 616 svchost.exe 1200 09876523456789.exe 616 svchost.exe 288 explorer.exe 288 explorer.exe 616 svchost.exe 616 svchost.exe 288 explorer.exe 288 explorer.exe 616 svchost.exe 616 svchost.exe 288 explorer.exe 288 explorer.exe 616 svchost.exe 288 explorer.exe 616 svchost.exe 616 svchost.exe 288 explorer.exe 616 svchost.exe 288 explorer.exe 288 explorer.exe 616 svchost.exe 616 svchost.exe 288 explorer.exe 288 explorer.exe 616 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 288 explorer.exe 616 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
09876523456789.exedescription pid process Token: SeDebugPrivilege 1200 09876523456789.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
09876523456789.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 1116 09876523456789.exe 1116 09876523456789.exe 2028 icsys.icn.exe 2028 icsys.icn.exe 288 explorer.exe 288 explorer.exe 684 spoolsv.exe 684 spoolsv.exe 616 svchost.exe 616 svchost.exe 1048 spoolsv.exe 1048 spoolsv.exe 288 explorer.exe 288 explorer.exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
09876523456789.exe09876523456789.exe09876523456789.exe icsys.icn.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 2008 wrote to memory of 1116 2008 09876523456789.exe 09876523456789.exe PID 2008 wrote to memory of 1116 2008 09876523456789.exe 09876523456789.exe PID 2008 wrote to memory of 1116 2008 09876523456789.exe 09876523456789.exe PID 2008 wrote to memory of 1116 2008 09876523456789.exe 09876523456789.exe PID 1116 wrote to memory of 1620 1116 09876523456789.exe 09876523456789.exe PID 1116 wrote to memory of 1620 1116 09876523456789.exe 09876523456789.exe PID 1116 wrote to memory of 1620 1116 09876523456789.exe 09876523456789.exe PID 1116 wrote to memory of 1620 1116 09876523456789.exe 09876523456789.exe PID 1620 wrote to memory of 1200 1620 09876523456789.exe 09876523456789.exe PID 1620 wrote to memory of 1200 1620 09876523456789.exe 09876523456789.exe PID 1620 wrote to memory of 1200 1620 09876523456789.exe 09876523456789.exe PID 1620 wrote to memory of 1200 1620 09876523456789.exe 09876523456789.exe PID 1620 wrote to memory of 1200 1620 09876523456789.exe 09876523456789.exe PID 1620 wrote to memory of 1200 1620 09876523456789.exe 09876523456789.exe PID 1620 wrote to memory of 1200 1620 09876523456789.exe 09876523456789.exe PID 1620 wrote to memory of 1200 1620 09876523456789.exe 09876523456789.exe PID 1620 wrote to memory of 1200 1620 09876523456789.exe 09876523456789.exe PID 1620 wrote to memory of 1200 1620 09876523456789.exe 09876523456789.exe PID 1620 wrote to memory of 1200 1620 09876523456789.exe 09876523456789.exe PID 1116 wrote to memory of 2028 1116 09876523456789.exe icsys.icn.exe PID 1116 wrote to memory of 2028 1116 09876523456789.exe icsys.icn.exe PID 1116 wrote to memory of 2028 1116 09876523456789.exe icsys.icn.exe PID 1116 wrote to memory of 2028 1116 09876523456789.exe icsys.icn.exe PID 2028 wrote to memory of 288 2028 icsys.icn.exe explorer.exe PID 2028 wrote to memory of 288 2028 icsys.icn.exe explorer.exe PID 2028 wrote to memory of 288 2028 icsys.icn.exe explorer.exe PID 2028 wrote to memory of 288 2028 icsys.icn.exe explorer.exe PID 288 wrote to memory of 684 288 explorer.exe spoolsv.exe PID 288 wrote to memory of 684 288 explorer.exe spoolsv.exe PID 288 wrote to memory of 684 288 explorer.exe spoolsv.exe PID 288 wrote to memory of 684 288 explorer.exe spoolsv.exe PID 684 wrote to memory of 616 684 spoolsv.exe svchost.exe PID 684 wrote to memory of 616 684 spoolsv.exe svchost.exe PID 684 wrote to memory of 616 684 spoolsv.exe svchost.exe PID 684 wrote to memory of 616 684 spoolsv.exe svchost.exe PID 616 wrote to memory of 1048 616 svchost.exe spoolsv.exe PID 616 wrote to memory of 1048 616 svchost.exe spoolsv.exe PID 616 wrote to memory of 1048 616 svchost.exe spoolsv.exe PID 616 wrote to memory of 1048 616 svchost.exe spoolsv.exe PID 616 wrote to memory of 944 616 svchost.exe at.exe PID 616 wrote to memory of 944 616 svchost.exe at.exe PID 616 wrote to memory of 944 616 svchost.exe at.exe PID 616 wrote to memory of 944 616 svchost.exe at.exe PID 616 wrote to memory of 1468 616 svchost.exe at.exe PID 616 wrote to memory of 1468 616 svchost.exe at.exe PID 616 wrote to memory of 1468 616 svchost.exe at.exe PID 616 wrote to memory of 1468 616 svchost.exe at.exe PID 616 wrote to memory of 1732 616 svchost.exe at.exe PID 616 wrote to memory of 1732 616 svchost.exe at.exe PID 616 wrote to memory of 1732 616 svchost.exe at.exe PID 616 wrote to memory of 1732 616 svchost.exe at.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\09876523456789.exe"C:\Users\Admin\AppData\Local\Temp\09876523456789.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\3582-490\09876523456789.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\09876523456789.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1116 -
\??\c:\users\admin\appdata\local\temp\3582-490\09876523456789.exec:\users\admin\appdata\local\temp\3582-490\09876523456789.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1620 -
\??\c:\users\admin\appdata\local\temp\3582-490\09876523456789.exec:\users\admin\appdata\local\temp\3582-490\09876523456789.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1200 -
C:\Users\Admin\AppData\Local\icsys.icn.exeC:\Users\Admin\AppData\Local\icsys.icn.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:288 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:684 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe6⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:616 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1048 -
C:\Windows\SysWOW64\at.exeat 12:39 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe7⤵PID:944
-
C:\Windows\SysWOW64\at.exeat 12:40 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe7⤵PID:1468
-
C:\Windows\SysWOW64\at.exeat 12:41 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe7⤵PID:1732
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3582-490\09876523456789.exeMD5
2fce217b06eab217e49e58ae373f8ddb
SHA13145657a134272e403320b87a2ef1df87ea9ab07
SHA256dcc03ca5b2fcce59c03b279d100abfe39f0b1bba99187ce8fd706baa1e106a91
SHA512421ae69e2381f6e07f1626c20f9b7fec8995c3bcfdc0abd9e45118c3db984997bfff373e2274ce5966a31013c806856df1a79ab9531d827a975ff26176e56d72
-
C:\Users\Admin\AppData\Local\Temp\3582-490\09876523456789.exeMD5
bcc7a93ad8bad83eb4caf6228bf8ae6b
SHA1c7cc5a1b3e11fa3bf8a5b387190a5bc371c3f523
SHA256cf956f8945da4247164dc3bfb243e6d56a721bed701a518cb9e3997505e11601
SHA512a8d435d39f62488bf592171e1addd13c07fe7105bb844a7d0b3af1220fa6b916cba7272731b87b6c129be5fd5e1099923cdf700b6682e82774eee11c672bcc7f
-
C:\Users\Admin\AppData\Local\Temp\3582-490\09876523456789.exeMD5
bcc7a93ad8bad83eb4caf6228bf8ae6b
SHA1c7cc5a1b3e11fa3bf8a5b387190a5bc371c3f523
SHA256cf956f8945da4247164dc3bfb243e6d56a721bed701a518cb9e3997505e11601
SHA512a8d435d39f62488bf592171e1addd13c07fe7105bb844a7d0b3af1220fa6b916cba7272731b87b6c129be5fd5e1099923cdf700b6682e82774eee11c672bcc7f
-
C:\Users\Admin\AppData\Local\icsys.icn.exeMD5
8329f0288b6df014a04153c750b678db
SHA15fb72256bbfdde0e47928e4d1712722b0ab64439
SHA25613d0e98683b22102fdfa7d36a0a509c273c3901f6d20969d8ce2a217e3be274b
SHA5128b586b39cb3a1944e16f791e1e637c3432ed382596f482f29f2845fb2803e29b929ced47c269ef305a2289c10202f0d8442cf16fd049ccd8cca55b32703ee394
-
C:\Users\Admin\AppData\Roaming\mrsys.exeMD5
7a14ecf95a7c3e9bc7ffe3ae95195403
SHA128ba90fb683a72587572539996519d1eb90e6be7
SHA2560d5881334499edf219bbf37532e2b08a85f5fd074cda8ebb354a9ec63431f4cc
SHA512ed18c397beb56440690ef492b7eb143b60691c33b0c12f858142647615880db268164c3f10f1c302a1e25555adde3d783a732f6e798b54308607621dbc4c0791
-
C:\Windows\system\explorer.exeMD5
8259671228e0506f3a600fb3f44f03d8
SHA1b202d1f910f52f285af63d9764fe92ecd8c4b2b6
SHA2561d7473c4924f023ad0a75765e02469c118c6a6a7ab9b3844e8494e7c1c86a85a
SHA51223f2c2cb4da557ed762f616d2309d90e9a62bfd9dbc5b7e113937a9fd9f05d10c57b36bd913b7203c6b9147d57ac02a3450433eb7e599ebbb1c81a2353e24b02
-
C:\Windows\system\spoolsv.exeMD5
5dc4e47854ba5507f13ddc2b5cd50a1d
SHA1b25d3a0d35d49bc62ffca9235d19bf82b37fba42
SHA256557dd1ff95d668f908ee6346de30d5f2dc1166b8a94251b807c64d5f1f77ac78
SHA512423dec1a413567b1631cd27cfd0c6bd384f5ef9e2741c4d06500f44a0f9182902c9e99cf98acac7431bddc00d4123eb004cc0b078543d38068c2415b48f60552
-
C:\Windows\system\spoolsv.exeMD5
5dc4e47854ba5507f13ddc2b5cd50a1d
SHA1b25d3a0d35d49bc62ffca9235d19bf82b37fba42
SHA256557dd1ff95d668f908ee6346de30d5f2dc1166b8a94251b807c64d5f1f77ac78
SHA512423dec1a413567b1631cd27cfd0c6bd384f5ef9e2741c4d06500f44a0f9182902c9e99cf98acac7431bddc00d4123eb004cc0b078543d38068c2415b48f60552
-
C:\Windows\system\svchost.exeMD5
d8861cb58fd1ab758be6c9a4cdfe0163
SHA17226da46343a2397294d395cf08d5efac7106576
SHA256b2d08dca5b268a93ed2b2fb51e78b2bff0d75f59e758fce37c78a36f85cd6d19
SHA5123a78f6ff58135b22cedd4c4f9b39539b3f660557ebfd2a428d47623b0c1c421044acde892fc6d4554dd41c5e19583dbc0c1e3c0db5781268335f80da6e6ff593
-
\??\c:\users\admin\appdata\local\icsys.icn.exeMD5
8329f0288b6df014a04153c750b678db
SHA15fb72256bbfdde0e47928e4d1712722b0ab64439
SHA25613d0e98683b22102fdfa7d36a0a509c273c3901f6d20969d8ce2a217e3be274b
SHA5128b586b39cb3a1944e16f791e1e637c3432ed382596f482f29f2845fb2803e29b929ced47c269ef305a2289c10202f0d8442cf16fd049ccd8cca55b32703ee394
-
\??\c:\users\admin\appdata\local\temp\3582-490\09876523456789.exeMD5
2fce217b06eab217e49e58ae373f8ddb
SHA13145657a134272e403320b87a2ef1df87ea9ab07
SHA256dcc03ca5b2fcce59c03b279d100abfe39f0b1bba99187ce8fd706baa1e106a91
SHA512421ae69e2381f6e07f1626c20f9b7fec8995c3bcfdc0abd9e45118c3db984997bfff373e2274ce5966a31013c806856df1a79ab9531d827a975ff26176e56d72
-
\??\c:\users\admin\appdata\local\temp\3582-490\09876523456789.exeMD5
bcc7a93ad8bad83eb4caf6228bf8ae6b
SHA1c7cc5a1b3e11fa3bf8a5b387190a5bc371c3f523
SHA256cf956f8945da4247164dc3bfb243e6d56a721bed701a518cb9e3997505e11601
SHA512a8d435d39f62488bf592171e1addd13c07fe7105bb844a7d0b3af1220fa6b916cba7272731b87b6c129be5fd5e1099923cdf700b6682e82774eee11c672bcc7f
-
\??\c:\windows\system\explorer.exeMD5
8259671228e0506f3a600fb3f44f03d8
SHA1b202d1f910f52f285af63d9764fe92ecd8c4b2b6
SHA2561d7473c4924f023ad0a75765e02469c118c6a6a7ab9b3844e8494e7c1c86a85a
SHA51223f2c2cb4da557ed762f616d2309d90e9a62bfd9dbc5b7e113937a9fd9f05d10c57b36bd913b7203c6b9147d57ac02a3450433eb7e599ebbb1c81a2353e24b02
-
\??\c:\windows\system\spoolsv.exeMD5
5dc4e47854ba5507f13ddc2b5cd50a1d
SHA1b25d3a0d35d49bc62ffca9235d19bf82b37fba42
SHA256557dd1ff95d668f908ee6346de30d5f2dc1166b8a94251b807c64d5f1f77ac78
SHA512423dec1a413567b1631cd27cfd0c6bd384f5ef9e2741c4d06500f44a0f9182902c9e99cf98acac7431bddc00d4123eb004cc0b078543d38068c2415b48f60552
-
\??\c:\windows\system\svchost.exeMD5
d8861cb58fd1ab758be6c9a4cdfe0163
SHA17226da46343a2397294d395cf08d5efac7106576
SHA256b2d08dca5b268a93ed2b2fb51e78b2bff0d75f59e758fce37c78a36f85cd6d19
SHA5123a78f6ff58135b22cedd4c4f9b39539b3f660557ebfd2a428d47623b0c1c421044acde892fc6d4554dd41c5e19583dbc0c1e3c0db5781268335f80da6e6ff593
-
\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXEMD5
9e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
\Users\Admin\AppData\Local\Temp\3582-490\09876523456789.exeMD5
2fce217b06eab217e49e58ae373f8ddb
SHA13145657a134272e403320b87a2ef1df87ea9ab07
SHA256dcc03ca5b2fcce59c03b279d100abfe39f0b1bba99187ce8fd706baa1e106a91
SHA512421ae69e2381f6e07f1626c20f9b7fec8995c3bcfdc0abd9e45118c3db984997bfff373e2274ce5966a31013c806856df1a79ab9531d827a975ff26176e56d72
-
\Users\Admin\AppData\Local\Temp\3582-490\09876523456789.exeMD5
2fce217b06eab217e49e58ae373f8ddb
SHA13145657a134272e403320b87a2ef1df87ea9ab07
SHA256dcc03ca5b2fcce59c03b279d100abfe39f0b1bba99187ce8fd706baa1e106a91
SHA512421ae69e2381f6e07f1626c20f9b7fec8995c3bcfdc0abd9e45118c3db984997bfff373e2274ce5966a31013c806856df1a79ab9531d827a975ff26176e56d72
-
\Users\Admin\AppData\Local\Temp\3582-490\09876523456789.exeMD5
bcc7a93ad8bad83eb4caf6228bf8ae6b
SHA1c7cc5a1b3e11fa3bf8a5b387190a5bc371c3f523
SHA256cf956f8945da4247164dc3bfb243e6d56a721bed701a518cb9e3997505e11601
SHA512a8d435d39f62488bf592171e1addd13c07fe7105bb844a7d0b3af1220fa6b916cba7272731b87b6c129be5fd5e1099923cdf700b6682e82774eee11c672bcc7f
-
\Users\Admin\AppData\Local\Temp\3582-490\09876523456789.exeMD5
bcc7a93ad8bad83eb4caf6228bf8ae6b
SHA1c7cc5a1b3e11fa3bf8a5b387190a5bc371c3f523
SHA256cf956f8945da4247164dc3bfb243e6d56a721bed701a518cb9e3997505e11601
SHA512a8d435d39f62488bf592171e1addd13c07fe7105bb844a7d0b3af1220fa6b916cba7272731b87b6c129be5fd5e1099923cdf700b6682e82774eee11c672bcc7f
-
\Users\Admin\AppData\Local\Temp\nsgB8F3.tmp\shbtviyozv.dllMD5
b08548c50aeca632a4f589cf225be6e2
SHA1102d9cb4a737eb6a0e130544f3aaf28603b199ac
SHA25673d6764798d0afe045ef2dfd8c04d19fdaaa844ccd8beb8297025bca8bdb4cf0
SHA512bb07aebac4284c457c99d36ccc1c1a8dcb8056c20ca5749f7bd20f9260cc974293ef0271fc6b311078569029c216f60fd470e0fc9adaef3a6a9b3c7b1f0ad94b
-
\Users\Admin\AppData\Local\icsys.icn.exeMD5
8329f0288b6df014a04153c750b678db
SHA15fb72256bbfdde0e47928e4d1712722b0ab64439
SHA25613d0e98683b22102fdfa7d36a0a509c273c3901f6d20969d8ce2a217e3be274b
SHA5128b586b39cb3a1944e16f791e1e637c3432ed382596f482f29f2845fb2803e29b929ced47c269ef305a2289c10202f0d8442cf16fd049ccd8cca55b32703ee394
-
\Users\Admin\AppData\Local\icsys.icn.exeMD5
8329f0288b6df014a04153c750b678db
SHA15fb72256bbfdde0e47928e4d1712722b0ab64439
SHA25613d0e98683b22102fdfa7d36a0a509c273c3901f6d20969d8ce2a217e3be274b
SHA5128b586b39cb3a1944e16f791e1e637c3432ed382596f482f29f2845fb2803e29b929ced47c269ef305a2289c10202f0d8442cf16fd049ccd8cca55b32703ee394
-
\Users\Admin\AppData\Local\icsys.icn.exeMD5
8329f0288b6df014a04153c750b678db
SHA15fb72256bbfdde0e47928e4d1712722b0ab64439
SHA25613d0e98683b22102fdfa7d36a0a509c273c3901f6d20969d8ce2a217e3be274b
SHA5128b586b39cb3a1944e16f791e1e637c3432ed382596f482f29f2845fb2803e29b929ced47c269ef305a2289c10202f0d8442cf16fd049ccd8cca55b32703ee394
-
\Users\Admin\AppData\Roaming\mrsys.exeMD5
7a14ecf95a7c3e9bc7ffe3ae95195403
SHA128ba90fb683a72587572539996519d1eb90e6be7
SHA2560d5881334499edf219bbf37532e2b08a85f5fd074cda8ebb354a9ec63431f4cc
SHA512ed18c397beb56440690ef492b7eb143b60691c33b0c12f858142647615880db268164c3f10f1c302a1e25555adde3d783a732f6e798b54308607621dbc4c0791
-
\Windows\system\explorer.exeMD5
8259671228e0506f3a600fb3f44f03d8
SHA1b202d1f910f52f285af63d9764fe92ecd8c4b2b6
SHA2561d7473c4924f023ad0a75765e02469c118c6a6a7ab9b3844e8494e7c1c86a85a
SHA51223f2c2cb4da557ed762f616d2309d90e9a62bfd9dbc5b7e113937a9fd9f05d10c57b36bd913b7203c6b9147d57ac02a3450433eb7e599ebbb1c81a2353e24b02
-
\Windows\system\explorer.exeMD5
8259671228e0506f3a600fb3f44f03d8
SHA1b202d1f910f52f285af63d9764fe92ecd8c4b2b6
SHA2561d7473c4924f023ad0a75765e02469c118c6a6a7ab9b3844e8494e7c1c86a85a
SHA51223f2c2cb4da557ed762f616d2309d90e9a62bfd9dbc5b7e113937a9fd9f05d10c57b36bd913b7203c6b9147d57ac02a3450433eb7e599ebbb1c81a2353e24b02
-
\Windows\system\spoolsv.exeMD5
5dc4e47854ba5507f13ddc2b5cd50a1d
SHA1b25d3a0d35d49bc62ffca9235d19bf82b37fba42
SHA256557dd1ff95d668f908ee6346de30d5f2dc1166b8a94251b807c64d5f1f77ac78
SHA512423dec1a413567b1631cd27cfd0c6bd384f5ef9e2741c4d06500f44a0f9182902c9e99cf98acac7431bddc00d4123eb004cc0b078543d38068c2415b48f60552
-
\Windows\system\spoolsv.exeMD5
5dc4e47854ba5507f13ddc2b5cd50a1d
SHA1b25d3a0d35d49bc62ffca9235d19bf82b37fba42
SHA256557dd1ff95d668f908ee6346de30d5f2dc1166b8a94251b807c64d5f1f77ac78
SHA512423dec1a413567b1631cd27cfd0c6bd384f5ef9e2741c4d06500f44a0f9182902c9e99cf98acac7431bddc00d4123eb004cc0b078543d38068c2415b48f60552
-
\Windows\system\spoolsv.exeMD5
5dc4e47854ba5507f13ddc2b5cd50a1d
SHA1b25d3a0d35d49bc62ffca9235d19bf82b37fba42
SHA256557dd1ff95d668f908ee6346de30d5f2dc1166b8a94251b807c64d5f1f77ac78
SHA512423dec1a413567b1631cd27cfd0c6bd384f5ef9e2741c4d06500f44a0f9182902c9e99cf98acac7431bddc00d4123eb004cc0b078543d38068c2415b48f60552
-
\Windows\system\spoolsv.exeMD5
5dc4e47854ba5507f13ddc2b5cd50a1d
SHA1b25d3a0d35d49bc62ffca9235d19bf82b37fba42
SHA256557dd1ff95d668f908ee6346de30d5f2dc1166b8a94251b807c64d5f1f77ac78
SHA512423dec1a413567b1631cd27cfd0c6bd384f5ef9e2741c4d06500f44a0f9182902c9e99cf98acac7431bddc00d4123eb004cc0b078543d38068c2415b48f60552
-
\Windows\system\svchost.exeMD5
d8861cb58fd1ab758be6c9a4cdfe0163
SHA17226da46343a2397294d395cf08d5efac7106576
SHA256b2d08dca5b268a93ed2b2fb51e78b2bff0d75f59e758fce37c78a36f85cd6d19
SHA5123a78f6ff58135b22cedd4c4f9b39539b3f660557ebfd2a428d47623b0c1c421044acde892fc6d4554dd41c5e19583dbc0c1e3c0db5781268335f80da6e6ff593
-
\Windows\system\svchost.exeMD5
d8861cb58fd1ab758be6c9a4cdfe0163
SHA17226da46343a2397294d395cf08d5efac7106576
SHA256b2d08dca5b268a93ed2b2fb51e78b2bff0d75f59e758fce37c78a36f85cd6d19
SHA5123a78f6ff58135b22cedd4c4f9b39539b3f660557ebfd2a428d47623b0c1c421044acde892fc6d4554dd41c5e19583dbc0c1e3c0db5781268335f80da6e6ff593
-
memory/288-87-0x0000000000000000-mapping.dmp
-
memory/616-105-0x0000000000000000-mapping.dmp
-
memory/684-96-0x0000000000000000-mapping.dmp
-
memory/944-120-0x0000000000000000-mapping.dmp
-
memory/1048-114-0x0000000000000000-mapping.dmp
-
memory/1116-57-0x0000000000000000-mapping.dmp
-
memory/1200-124-0x0000000000392000-0x0000000000394000-memory.dmpFilesize
8KB
-
memory/1200-116-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/1200-72-0x000000000040188B-mapping.dmp
-
memory/1200-125-0x0000000000397000-0x0000000000398000-memory.dmpFilesize
4KB
-
memory/1200-126-0x0000000000398000-0x0000000000399000-memory.dmpFilesize
4KB
-
memory/1200-79-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1200-123-0x0000000000391000-0x0000000000392000-memory.dmpFilesize
4KB
-
memory/1200-71-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1468-130-0x0000000000000000-mapping.dmp
-
memory/1620-65-0x0000000000000000-mapping.dmp
-
memory/1732-132-0x0000000000000000-mapping.dmp
-
memory/2008-54-0x0000000075C11000-0x0000000075C13000-memory.dmpFilesize
8KB
-
memory/2028-77-0x0000000000000000-mapping.dmp