Analysis
-
max time kernel
299s -
max time network
239s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
09/12/2021, 07:42
Static task
static1
Behavioral task
behavioral1
Sample
Doitman.exe
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Doitman.exe
Resource
win10-en-20211208
0 signatures
0 seconds
General
-
Target
Doitman.exe
-
Size
125KB
-
MD5
f28ac8c53e1776f0bb151bfe969cb50c
-
SHA1
ac6d92aa5213bf0431999688f63c37d72a6206bf
-
SHA256
e95902e83c3cd7ceef665f91faba200dd487a073996e34ae3f041a00d0a061a5
-
SHA512
5ccb69f839dda459fca95a0731a152f831e32e23521e47506710a824a1d5779d59ce1752f623b700a1416263a5537f7c92c16f43c6c9ded028839493bbed8e7c
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\SubmitLimit.tiff Doitman.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Doitman.exe -
Loads dropped DLL 6 IoCs
pid Process 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Doitman.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini Doitman.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini Doitman.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Doitman.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Doitman.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Doitman.exe File opened for modification C:\Users\Public\Desktop\desktop.ini Doitman.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini Doitman.exe File opened for modification C:\Users\Public\Downloads\desktop.ini Doitman.exe File opened for modification C:\Users\Public\Videos\desktop.ini Doitman.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Doitman.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FNOUQX38\desktop.ini Doitman.exe File opened for modification C:\$RECYCLE.BIN\S-1-5-21-3846991908-3261386348-1409841751-1000\desktop.ini Explorer.EXE File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Doitman.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini Explorer.EXE File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Doitman.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RO7FJFDE\desktop.ini Doitman.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini Doitman.exe File opened for modification C:\Users\Admin\Searches\desktop.ini Doitman.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini Doitman.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini Doitman.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\NK9YD4KU\desktop.ini Doitman.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Doitman.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini Doitman.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini Doitman.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Doitman.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Doitman.exe File opened for modification C:\Program Files\desktop.ini Doitman.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini Doitman.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Doitman.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini Doitman.exe File opened for modification C:\Users\Admin\Music\desktop.ini Doitman.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini Doitman.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini Doitman.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Doitman.exe File opened for modification C:\Users\Admin\Documents\desktop.ini Doitman.exe File opened for modification C:\Users\Public\Music\desktop.ini Doitman.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini Doitman.exe File opened for modification C:\Windows\assembly\Desktop.ini Doitman.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI Doitman.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini Doitman.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini Doitman.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T0STXTA8\desktop.ini Doitman.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini Doitman.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini Doitman.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Doitman.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Doitman.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini Doitman.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T7AS43M2\desktop.ini Doitman.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Doitman.exe File opened for modification C:\Users\Public\Libraries\desktop.ini Doitman.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini Doitman.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini Doitman.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini Doitman.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini Doitman.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\S3IV548V\desktop.ini Doitman.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini Doitman.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini Doitman.exe File opened for modification C:\Users\Admin\Links\desktop.ini Doitman.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini Doitman.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini Doitman.exe File opened for modification C:\Program Files (x86)\desktop.ini Doitman.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini Doitman.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\performance.png Doitman.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.reconciler.dropins.nl_zh_4.4.0.v20140623020002.jar Doitman.exe File opened for modification C:\Program Files\Java\jre7\bin\ssv.dll Doitman.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Istanbul Doitman.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\highDpiImageSwap.js Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187837.WMF Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00034_.WMF Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\EXCEL.DEV_K_COL.HXK Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\bg-today.png Doitman.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-openide-util-enumerations.jar Doitman.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT+12 Doitman.exe File opened for modification C:\Program Files\Windows Media Player\ja-JP\wmplayer.exe.mui Doitman.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01245_.GIF Doitman.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHEVI.DLL Doitman.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_double_orange.png Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH01235U.BMP Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01295_.GIF Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Pushpin.thmx Doitman.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_gray_cloudy.png Doitman.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\1047_576black.png Doitman.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\es-ES\ChkrRes.dll.mui Doitman.exe File opened for modification C:\Program Files\Windows Sidebar\es-ES\sbdrop.dll.mui Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341455.JPG Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0384895.JPG Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXSEC32.DLL Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mset7db.kic Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\subscription.xsd Doitman.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.alert_5.5.0.165303.jar Doitman.exe File opened for modification C:\Program Files\Microsoft Games\More Games\en-US\MoreGames.dll.mui Doitman.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_bw32.bmp Doitman.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\flyout.html Doitman.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\activity16v.png Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OWSCLT.DLL Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_COL.HXT Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BORDERS\MSART8.BDR Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Casual.gif Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD00155_.WMF Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0384900.JPG Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02750G.GIF Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SL00286_.WMF Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_SlateBlue.gif Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\VelvetRose.css Doitman.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\PresentationFramework.Luna.dll Doitman.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\16-on-black.gif Doitman.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe Doitman.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe Doitman.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\manifest.json Doitman.exe File created C:\Program Files\VideoLAN\VLC\locale\fa\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_transcode_plugin.dll Doitman.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\settings.css Doitman.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\NETWORK\NETWORK.ELM Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\CommsOutgoingImageMask.bmp Doitman.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_box_bottom.png Doitman.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\glib-lite.dll Doitman.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd-BoldOblique.otf Doitman.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CAPSULES\PREVIEW.GIF Doitman.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECLIPSE\PREVIEW.GIF Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02058U.BMP Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\OUTEX2.ECF Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\Tasks.accdt Doitman.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02066_.WMF Doitman.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\assembly\GAC_MSIL\EventViewer.Resources\6.1.0.0_es_31bf3856ad364e35\EventViewer.resources.dll Doitman.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Security.ApplicationId.Wizards.AutomaticRuleGenerationWizard.resources\6.1.0.0_ja_31bf3856ad364e35\Microsoft.Security.ApplicationId.Wizards.AutomaticRuleGenerationWizard.resources.dll Doitman.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.VisualStudio.Tools.Office.Word.AddInProxy.v9.0\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\System.DirectorySer#\45ec12795950a7d54691591c615a9e3c\System.DirectoryServices.ni.dll Doitman.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Applicati#\74c8f5e75ec10458436bb476c2cfd9fc\Microsoft.ApplicationId.RuleWizard.ni.dll Doitman.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Web.DynamicData.resources\3.5.0.0_de_31bf3856ad364e35\System.Web.DynamicData.Resources.dll Doitman.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing.Desi#\!!ReadmeForHelp!!.txt Doitman.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatiod51afaa5#\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\GAC_MSIL\IIEHost\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Security.ApplicationId.PolicyManagement.Cmdlets.Resources\6.1.0.0_de_31bf3856ad364e35\Microsoft.Security.ApplicationId.PolicyManagement.Cmdlets.Resources.dll Doitman.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\Accessibility\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\System.Transactions\!!ReadmeForHelp!!.txt Doitman.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Data7706cdc8#\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Policy.12.0.Microsoft.Office.Interop.InfoPath\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Core\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Managemen#\e72886c96b63be364c0205b6c4ff4413\Microsoft.ManagementConsole.ni.dll Doitman.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\ehiUPnP\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Data\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\PresentationUI\6f4c8aeb8f066adf5cafedbec0cac415\PresentationUI.ni.dll Doitman.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\!!ReadmeForHelp!!.txt Doitman.exe File created C:\Windows\assembly\GAC_MSIL\ehiTVMSMusic\!!ReadmeForHelp!!.txt Doitman.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\System.DirectorySer#\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\System.ServiceModel#\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Confe64a9051#\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\mcstoredb\c359669d601990310a6b30ab5992ffa8\mcstoredb.ni.dll Doitman.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\SMDiagnostics\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Security.Resources\1.0.0.0_en_31bf3856ad364e35\Microsoft.PowerShell.Security.Resources.dll Doitman.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.IdentityModel.Selectors\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualC\!!ReadmeForHelp!!.txt Doitman.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\CustomMarshalers\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Security.ApplicationId.Wizards.AutomaticRuleGenerationWizard.resources\6.1.0.0_es_31bf3856ad364e35\Microsoft.Security.ApplicationId.Wizards.AutomaticRuleGenerationWizard.resources.dll Doitman.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationUI\efec1926513ece87ff644670cdd80031\PresentationUI.ni.dll.aux Doitman.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\MMCEx\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\GAC_64\BDATunePIA\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.DirectoryServices.resources\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Utilities\!!ReadmeForHelp!!.txt Doitman.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.VisualStudio.Tools.Office.Excel.AddInProxy.v9.0\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\UIAutomationClients#\!!ReadmeForHelp!!.txt Doitman.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.Office.BusinessApplications.SyncServices\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.VisualStudio.Tools.Office.AppInfoDocument.v9.0\9.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualStudio.Tools.Office.AppInfoDocument.v9.0.dll Doitman.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\UIAutomationProvider\!!ReadmeForHelp!!.txt Doitman.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Windows.D#\!!ReadmeForHelp!!.txt Doitman.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\System.ServiceModel\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\pubpol4.dat Doitman.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Policy.12.0.Microsoft.Office.Interop.PowerPoint\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Ink.Resources\6.1.0.0_fr_31bf3856ad364e35\Microsoft.Ink.Resources.dll Doitman.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Policy.11.0.Microsoft.Office.Interop.SmartTag\14.0.0.0__71e9bce111e9429c\Policy.11.0.Microsoft.Office.Interop.SmartTag.dll Doitman.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Policy.12.0.Microsoft.Office.Interop.InfoPath\14.0.0.0__71e9bce111e9429c\Policy.12.0.Microsoft.Office.Interop.InfoPath.config Doitman.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.XML.resources\2.0.0.0_ja_b77a5c561934e089\System.xml.Resources.dll Doitman.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\System.Configuration\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\GAC_MSIL\PresentationFramework.resources\3.0.0.0_fr_31bf3856ad364e35\PresentationFramework.resources.dll Doitman.exe File created C:\Windows\assembly\GAC_MSIL\System.Data.Services.Client\!!ReadmeForHelp!!.txt Doitman.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Office.Bu#\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\AppPatch\pcamain.sdb Doitman.exe File opened for modification C:\Windows\assembly\GAC_32\Microsoft.Office.InfoPath.Client.Internal.Host.Interop\14.0.0.0__71e9bce111e9429c\Microsoft.Office.Infopath.Client.Internal.Host.Interop.dll Doitman.exe File created C:\Windows\assembly\GAC_64\mcupdate\!!ReadmeForHelp!!.txt Doitman.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.VisualBasic.Compatibility\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\GAC_MSIL\system.runtime.serialization.resources\3.0.0.0_ja_b77a5c561934e089\System.RunTime.Serialization.Resources.dll Doitman.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Web.Extensio#\!!ReadmeForHelp!!.txt Doitman.exe File created C:\Windows\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\!!ReadmeForHelp!!.txt Doitman.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Security.#\9fa0c0ee9093a5f1aaabffb101332056\Microsoft.Security.ApplicationId.PolicyManagement.PolicyModel.ni.dll Doitman.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Data\1288d7e030bc0c5d8b2cbe5f33aeed7f\System.Data.ni.dll.aux Doitman.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1832 1208 WerFault.exe 12 1724 2044 WerFault.exe 38 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Explorer.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Explorer.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Explorer.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Explorer.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Toolbar Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Toolbar Explorer.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616209" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1\0\0 = 52003100000000008953cd3d11004465736b746f70003c0008000400efbe8853287a8953cd3d2a000000ec0100000000020000000000000000000000000000004400650073006b0074006f007000000016000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1\0\0\MRUListEx = ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\NodeSlot = "5" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "2" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616209" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "4" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202020202 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 19002f433a5c000000000000000000000000000000000000000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = 0000000001000000ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_Classes\Local Settings Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\9 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1\NodeSlot = "6" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\NodeSlot = "7" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac04000000c8000000354b179bff40d211a27e00c04fc308710300000080000000354b179bff40d211a27e00c04fc308710200000080000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "4294967295" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\NodeSlot = "4" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell\SniffedFolderType = "Generic" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1\0 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = 00000000ffffffff Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Generic" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1 = 4c003100000000008953c53d1100557365727300380008000400efbeee3a851a8953c53d2a000000e601000000000100000000000000000000000000000055007300650072007300000014000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_Classes\Local Settings Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\SniffedFolderType = "Generic" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616209" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1\0\0\NodeSlot = "9" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\HotKey = "0" Explorer.EXE -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 560 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1832 WerFault.exe 1832 WerFault.exe 1832 WerFault.exe 1832 WerFault.exe 1832 WerFault.exe 1724 WerFault.exe 1724 WerFault.exe 1724 WerFault.exe 1724 WerFault.exe 1724 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2044 Explorer.EXE 1800 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 54 IoCs
description pid Process Token: SeDebugPrivilege 1832 WerFault.exe Token: SeShutdownPrivilege 2044 Explorer.EXE Token: SeShutdownPrivilege 2044 Explorer.EXE Token: SeShutdownPrivilege 2044 Explorer.EXE Token: SeShutdownPrivilege 2044 Explorer.EXE Token: SeShutdownPrivilege 2044 Explorer.EXE Token: SeShutdownPrivilege 2044 Explorer.EXE Token: SeShutdownPrivilege 2044 Explorer.EXE Token: SeShutdownPrivilege 2044 Explorer.EXE Token: SeShutdownPrivilege 2044 Explorer.EXE Token: SeShutdownPrivilege 2044 Explorer.EXE Token: SeShutdownPrivilege 2044 Explorer.EXE Token: SeShutdownPrivilege 2044 Explorer.EXE Token: SeShutdownPrivilege 2044 Explorer.EXE Token: SeShutdownPrivilege 2044 Explorer.EXE Token: SeDebugPrivilege 1724 WerFault.exe Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE Token: SeShutdownPrivilege 1800 Explorer.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE 2044 Explorer.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE 1800 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2044 1832 WerFault.exe 38 PID 1832 wrote to memory of 2044 1832 WerFault.exe 38 PID 1832 wrote to memory of 2044 1832 WerFault.exe 38 PID 2044 wrote to memory of 1724 2044 Explorer.EXE 42 PID 2044 wrote to memory of 1724 2044 Explorer.EXE 42 PID 2044 wrote to memory of 1724 2044 Explorer.EXE 42 PID 1724 wrote to memory of 1800 1724 WerFault.exe 43 PID 1724 wrote to memory of 1800 1724 WerFault.exe 43 PID 1724 wrote to memory of 1800 1724 WerFault.exe 43 PID 1800 wrote to memory of 1832 1800 Explorer.EXE 47 PID 1800 wrote to memory of 1832 1800 Explorer.EXE 47 PID 1800 wrote to memory of 1832 1800 Explorer.EXE 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\Doitman.exe"C:\Users\Admin\AppData\Local\Temp\Doitman.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Drops file in Windows directory
PID:972
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\rJRMCpqvFjP6UJrNQ6c6JG2hjyUbdXrQV9IuekyY.txt1⤵
- Opens file in notepad (likely ransom note)
PID:560
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\!!ReadmeForHelp!!.txt1⤵PID:1832
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1324
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1208 -s 37921⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\Explorer.EXE"C:\Windows\Explorer.EXE"2⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2044 -s 33803⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\Explorer.EXE"C:\Windows\Explorer.EXE"4⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\!!ReadmeForHelp!!.txt5⤵PID:1832
-
-
-
-