Analysis
-
max time kernel
157s -
max time network
162s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
23-02-2022 00:38
Static task
static1
Behavioral task
behavioral1
Sample
02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe
Resource
win10v2004-en-20220113
General
-
Target
02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe
-
Size
3.3MB
-
MD5
77ab7e4dc7dcc201aabca121245d37de
-
SHA1
05276c0f69e0cb1b0acfd125604eaa703d442f30
-
SHA256
02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b
-
SHA512
307e460a5fb0c06b44beea2e826d89434a71daba30210efd558d1b0a6b2b8fb75171d1d064c2703e1297c032fb8eb84a3c77c08747b2b5483017d648331d4b0b
Malware Config
Signatures
-
DiamondFox
DiamondFox is a multipurpose botnet with many capabilities.
-
DiamondFox stealer 7 IoCs
Processes:
resource yara_rule behavioral1/files/0x00070000000125f3-56.dat diamondfox_stealer behavioral1/files/0x00070000000125f3-58.dat diamondfox_stealer behavioral1/files/0x00070000000125f3-57.dat diamondfox_stealer behavioral1/files/0x000800000001263f-60.dat diamondfox_stealer behavioral1/files/0x000800000001263f-61.dat diamondfox_stealer behavioral1/files/0x000800000001263f-62.dat diamondfox_stealer behavioral1/files/0x000800000001263f-73.dat diamondfox_stealer -
NirSoft MailPassView 7 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral1/files/0x00070000000125f3-56.dat MailPassView behavioral1/files/0x00070000000125f3-58.dat MailPassView behavioral1/files/0x00070000000125f3-57.dat MailPassView behavioral1/files/0x0006000000013018-64.dat MailPassView behavioral1/files/0x0006000000013018-65.dat MailPassView behavioral1/files/0x0006000000013018-66.dat MailPassView behavioral1/memory/1400-74-0x0000000000DB0000-0x0000000001008000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 7 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral1/files/0x00070000000125f3-56.dat WebBrowserPassView behavioral1/files/0x00070000000125f3-58.dat WebBrowserPassView behavioral1/files/0x00070000000125f3-57.dat WebBrowserPassView behavioral1/files/0x0006000000013018-64.dat WebBrowserPassView behavioral1/files/0x0006000000013018-65.dat WebBrowserPassView behavioral1/files/0x0006000000013018-66.dat WebBrowserPassView behavioral1/memory/1400-74-0x0000000000DB0000-0x0000000001008000-memory.dmp WebBrowserPassView -
Nirsoft 7 IoCs
Processes:
resource yara_rule behavioral1/files/0x00070000000125f3-56.dat Nirsoft behavioral1/files/0x00070000000125f3-58.dat Nirsoft behavioral1/files/0x00070000000125f3-57.dat Nirsoft behavioral1/files/0x0006000000013018-64.dat Nirsoft behavioral1/files/0x0006000000013018-65.dat Nirsoft behavioral1/files/0x0006000000013018-66.dat Nirsoft behavioral1/memory/1400-74-0x0000000000DB0000-0x0000000001008000-memory.dmp Nirsoft -
Executes dropped EXE 4 IoCs
Processes:
._cache_02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exeLOADER.EXEPREDATOR_V13_-_CRACKED.EXESynaptics.exepid Process 472 ._cache_02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe 1776 LOADER.EXE 1400 PREDATOR_V13_-_CRACKED.EXE 396 Synaptics.exe -
Processes:
resource yara_rule behavioral1/files/0x00060000000130ff-81.dat office_macros -
Loads dropped DLL 7 IoCs
Processes:
02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe._cache_02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exepid Process 800 02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe 800 02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe 472 ._cache_02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe 472 ._cache_02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe 472 ._cache_02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe 800 02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe 800 02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEdescription ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE -
Modifies registry class 64 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 1352 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
LOADER.EXEpid Process 1776 LOADER.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
LOADER.EXEEXCEL.EXEpid Process 1776 LOADER.EXE 1352 EXCEL.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe._cache_02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exedescription pid Process procid_target PID 800 wrote to memory of 472 800 02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe 27 PID 800 wrote to memory of 472 800 02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe 27 PID 800 wrote to memory of 472 800 02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe 27 PID 800 wrote to memory of 472 800 02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe 27 PID 472 wrote to memory of 1776 472 ._cache_02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe 28 PID 472 wrote to memory of 1776 472 ._cache_02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe 28 PID 472 wrote to memory of 1776 472 ._cache_02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe 28 PID 472 wrote to memory of 1776 472 ._cache_02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe 28 PID 472 wrote to memory of 1400 472 ._cache_02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe 29 PID 472 wrote to memory of 1400 472 ._cache_02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe 29 PID 472 wrote to memory of 1400 472 ._cache_02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe 29 PID 472 wrote to memory of 1400 472 ._cache_02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe 29 PID 800 wrote to memory of 396 800 02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe 30 PID 800 wrote to memory of 396 800 02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe 30 PID 800 wrote to memory of 396 800 02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe 30 PID 800 wrote to memory of 396 800 02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe"C:\Users\Admin\AppData\Local\Temp\02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\._cache_02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe"C:\Users\Admin\AppData\Local\Temp\._cache_02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Users\Admin\AppData\Local\Temp\LOADER.EXE"C:\Users\Admin\AppData\Local\Temp\LOADER.EXE"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\PREDATOR_V13_-_CRACKED.EXE"C:\Users\Admin\AppData\Local\Temp\PREDATOR_V13_-_CRACKED.EXE"3⤵
- Executes dropped EXE
PID:1400
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
PID:396
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1352
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
a6e29babac0921af730b922c31b4fc11
SHA105afe6dda4c7c0990c2661ae326db517b01a39a7
SHA256eafaa54399a4bcea7aef9ad793e1f916b312bd573289b66a735c034be677f37f
SHA512fb6ec87efa9ebeb6200fe0b87c8b93ab0256edf656e6719b533915aad49e1886d4c3d43bd1f4837ab02f0f4f321962a548c2727d850f44a1c01a509ef11254dd
-
MD5
a6e29babac0921af730b922c31b4fc11
SHA105afe6dda4c7c0990c2661ae326db517b01a39a7
SHA256eafaa54399a4bcea7aef9ad793e1f916b312bd573289b66a735c034be677f37f
SHA512fb6ec87efa9ebeb6200fe0b87c8b93ab0256edf656e6719b533915aad49e1886d4c3d43bd1f4837ab02f0f4f321962a548c2727d850f44a1c01a509ef11254dd
-
C:\Users\Admin\AppData\Local\Temp\._cache_02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe
MD5045d0eb447c5699ac0cbf14c7c71fd65
SHA1b439144c304664b71944c2c42319f8f7c29d0fa5
SHA2560ccb874e6f1679d4cb9a285698490423495e53e1034407fe2f038603e3a38b95
SHA51288cabe12d935bc54c08a497a12cc383f557200d54b162227dde2f6d11101159dc645d2ce81418b24656be187684ba428458c17bacbaa2630f7464b5a15821652
-
MD5
e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
MD5
2487bf51db360a851d5abb8bbfc526f0
SHA17767d4133ab6d641357e51a607177383fffbb5ba
SHA2564b09681c66f0c5c1b3a3bafaaa55e20287d144043b16a5de07e0246538f119e7
SHA512dffd79f811387328c9a6e76b29c5d4a178f77fb3e513a32db35b6ee29e2b2c6b24d8cc2192fe90a6cba6d7994f653728de07d68f54d05eecca56554fbfe877f5
-
MD5
2487bf51db360a851d5abb8bbfc526f0
SHA17767d4133ab6d641357e51a607177383fffbb5ba
SHA2564b09681c66f0c5c1b3a3bafaaa55e20287d144043b16a5de07e0246538f119e7
SHA512dffd79f811387328c9a6e76b29c5d4a178f77fb3e513a32db35b6ee29e2b2c6b24d8cc2192fe90a6cba6d7994f653728de07d68f54d05eecca56554fbfe877f5
-
MD5
e02abacb924b4ce0595218e7a0fad489
SHA1a50b5f9909c2dd09dcad17c93d733574468c2aad
SHA2566be8beb86169c5766e63913263f743ccb9ecc3b970b2031ae06bdcfe0e726457
SHA5121506413a4cc2c56ec0b1b26a769442b20b8a2a44fc84bd911c24c186283e3bccd8a6e8bcf965041cc79a3310b5974bea8d8784ab05fe9cfa7e83d4564c4a6872
-
MD5
e02abacb924b4ce0595218e7a0fad489
SHA1a50b5f9909c2dd09dcad17c93d733574468c2aad
SHA2566be8beb86169c5766e63913263f743ccb9ecc3b970b2031ae06bdcfe0e726457
SHA5121506413a4cc2c56ec0b1b26a769442b20b8a2a44fc84bd911c24c186283e3bccd8a6e8bcf965041cc79a3310b5974bea8d8784ab05fe9cfa7e83d4564c4a6872
-
MD5
a6e29babac0921af730b922c31b4fc11
SHA105afe6dda4c7c0990c2661ae326db517b01a39a7
SHA256eafaa54399a4bcea7aef9ad793e1f916b312bd573289b66a735c034be677f37f
SHA512fb6ec87efa9ebeb6200fe0b87c8b93ab0256edf656e6719b533915aad49e1886d4c3d43bd1f4837ab02f0f4f321962a548c2727d850f44a1c01a509ef11254dd
-
MD5
a6e29babac0921af730b922c31b4fc11
SHA105afe6dda4c7c0990c2661ae326db517b01a39a7
SHA256eafaa54399a4bcea7aef9ad793e1f916b312bd573289b66a735c034be677f37f
SHA512fb6ec87efa9ebeb6200fe0b87c8b93ab0256edf656e6719b533915aad49e1886d4c3d43bd1f4837ab02f0f4f321962a548c2727d850f44a1c01a509ef11254dd
-
\Users\Admin\AppData\Local\Temp\._cache_02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe
MD5045d0eb447c5699ac0cbf14c7c71fd65
SHA1b439144c304664b71944c2c42319f8f7c29d0fa5
SHA2560ccb874e6f1679d4cb9a285698490423495e53e1034407fe2f038603e3a38b95
SHA51288cabe12d935bc54c08a497a12cc383f557200d54b162227dde2f6d11101159dc645d2ce81418b24656be187684ba428458c17bacbaa2630f7464b5a15821652
-
\Users\Admin\AppData\Local\Temp\._cache_02b4623f56f979b9082818d613cac29a56aba763288eacaee74e063469aca61b.exe
MD5045d0eb447c5699ac0cbf14c7c71fd65
SHA1b439144c304664b71944c2c42319f8f7c29d0fa5
SHA2560ccb874e6f1679d4cb9a285698490423495e53e1034407fe2f038603e3a38b95
SHA51288cabe12d935bc54c08a497a12cc383f557200d54b162227dde2f6d11101159dc645d2ce81418b24656be187684ba428458c17bacbaa2630f7464b5a15821652
-
MD5
2487bf51db360a851d5abb8bbfc526f0
SHA17767d4133ab6d641357e51a607177383fffbb5ba
SHA2564b09681c66f0c5c1b3a3bafaaa55e20287d144043b16a5de07e0246538f119e7
SHA512dffd79f811387328c9a6e76b29c5d4a178f77fb3e513a32db35b6ee29e2b2c6b24d8cc2192fe90a6cba6d7994f653728de07d68f54d05eecca56554fbfe877f5
-
MD5
2487bf51db360a851d5abb8bbfc526f0
SHA17767d4133ab6d641357e51a607177383fffbb5ba
SHA2564b09681c66f0c5c1b3a3bafaaa55e20287d144043b16a5de07e0246538f119e7
SHA512dffd79f811387328c9a6e76b29c5d4a178f77fb3e513a32db35b6ee29e2b2c6b24d8cc2192fe90a6cba6d7994f653728de07d68f54d05eecca56554fbfe877f5
-
MD5
e02abacb924b4ce0595218e7a0fad489
SHA1a50b5f9909c2dd09dcad17c93d733574468c2aad
SHA2566be8beb86169c5766e63913263f743ccb9ecc3b970b2031ae06bdcfe0e726457
SHA5121506413a4cc2c56ec0b1b26a769442b20b8a2a44fc84bd911c24c186283e3bccd8a6e8bcf965041cc79a3310b5974bea8d8784ab05fe9cfa7e83d4564c4a6872