Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20/05/2022, 12:42
Static task
static1
Behavioral task
behavioral1
Sample
861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe
Resource
win10v2004-20220414-en
General
-
Target
861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe
-
Size
1.3MB
-
MD5
bac833939f7c29317854a27ac8edfe10
-
SHA1
4fac9a4ec063ee0892c7a1e761a6a86097e90796
-
SHA256
861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a
-
SHA512
36b09d2c84de59b8d3ff99fe930545503de84479ea637564aaab4e6b0ac412ec6bc3ebbaffd05333cfeb803df39fb521d9166819b04beb8e02b809db10a03fc8
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet Payload 1 IoCs
resource yara_rule behavioral1/memory/1552-65-0x0000000010000000-0x0000000010017000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 4 IoCs
pid Process 1552 ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe 316 Synaptics.exe 1472 Ejbabmc.exe 1708 Ejbabmc.exe -
Loads dropped DLL 4 IoCs
pid Process 1292 861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe 1292 861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe 1292 861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe 1292 861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe File opened (read-only) \??\K: ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe File opened (read-only) \??\M: ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe File opened (read-only) \??\O: ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe File opened (read-only) \??\F: ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe File opened (read-only) \??\I: ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe File opened (read-only) \??\W: ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe File opened (read-only) \??\B: ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe File opened (read-only) \??\G: ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe File opened (read-only) \??\J: ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe File opened (read-only) \??\L: ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe File opened (read-only) \??\P: ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe File opened (read-only) \??\R: ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe File opened (read-only) \??\S: ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe File opened (read-only) \??\Z: ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe File opened (read-only) \??\Y: ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe File opened (read-only) \??\E: ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe File opened (read-only) \??\N: ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe File opened (read-only) \??\Q: ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe File opened (read-only) \??\T: ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe File opened (read-only) \??\U: ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe File opened (read-only) \??\V: ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe File opened (read-only) \??\X: ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Ejbabmc.exe ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe File opened for modification C:\Program Files (x86)\Ejbabmc.exe ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 756 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1552 ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1552 ._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe 1472 Ejbabmc.exe 756 EXCEL.EXE 1708 Ejbabmc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1292 wrote to memory of 1552 1292 861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe 28 PID 1292 wrote to memory of 1552 1292 861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe 28 PID 1292 wrote to memory of 1552 1292 861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe 28 PID 1292 wrote to memory of 1552 1292 861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe 28 PID 1292 wrote to memory of 316 1292 861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe 29 PID 1292 wrote to memory of 316 1292 861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe 29 PID 1292 wrote to memory of 316 1292 861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe 29 PID 1292 wrote to memory of 316 1292 861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe 29 PID 1472 wrote to memory of 1708 1472 Ejbabmc.exe 32 PID 1472 wrote to memory of 1708 1472 Ejbabmc.exe 32 PID 1472 wrote to memory of 1708 1472 Ejbabmc.exe 32 PID 1472 wrote to memory of 1708 1472 Ejbabmc.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe"C:\Users\Admin\AppData\Local\Temp\861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe"C:\Users\Admin\AppData\Local\Temp\._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1552
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
PID:316
-
-
C:\Program Files (x86)\Ejbabmc.exe"C:\Program Files (x86)\Ejbabmc.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Program Files (x86)\Ejbabmc.exe"C:\Program Files (x86)\Ejbabmc.exe" Win72⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1708
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:756
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
584KB
MD525b1052f544cdf4c57ae8b90d83df1ac
SHA12b1d50060504fd8ec7cbeea25ac4774128ca014e
SHA256a9ff0dd4a5ee46d64169a605a859d69f39b135df8bcc8a20b5a2c693aae65666
SHA512bc438cdcf7d7a8a74f57265f9bdc625373a6c0eb11ff9eac431ccf86abab4b6f18ee268108e1ef2053ca367c79385a159da80c7fa837cdf580e945c2e82cb584
-
Filesize
584KB
MD525b1052f544cdf4c57ae8b90d83df1ac
SHA12b1d50060504fd8ec7cbeea25ac4774128ca014e
SHA256a9ff0dd4a5ee46d64169a605a859d69f39b135df8bcc8a20b5a2c693aae65666
SHA512bc438cdcf7d7a8a74f57265f9bdc625373a6c0eb11ff9eac431ccf86abab4b6f18ee268108e1ef2053ca367c79385a159da80c7fa837cdf580e945c2e82cb584
-
Filesize
584KB
MD525b1052f544cdf4c57ae8b90d83df1ac
SHA12b1d50060504fd8ec7cbeea25ac4774128ca014e
SHA256a9ff0dd4a5ee46d64169a605a859d69f39b135df8bcc8a20b5a2c693aae65666
SHA512bc438cdcf7d7a8a74f57265f9bdc625373a6c0eb11ff9eac431ccf86abab4b6f18ee268108e1ef2053ca367c79385a159da80c7fa837cdf580e945c2e82cb584
-
Filesize
751KB
MD529e1b0ddfb7e090b081d2c5b21f1f0d7
SHA12ffd30e5347bb398aa9e2901c4fb1cdac445fc4a
SHA25611aa613976974b09005557a265e789da94ef8b90827f394272f8dd0905544a45
SHA512c0ccf9dea3db739800ddd5e565d2b5b97fcf03345881253423d411215cf80c9ed752968116c87ec0f07ca5671b93ede8c558fba3d34e92e549f7f573be6cc72f
-
Filesize
751KB
MD529e1b0ddfb7e090b081d2c5b21f1f0d7
SHA12ffd30e5347bb398aa9e2901c4fb1cdac445fc4a
SHA25611aa613976974b09005557a265e789da94ef8b90827f394272f8dd0905544a45
SHA512c0ccf9dea3db739800ddd5e565d2b5b97fcf03345881253423d411215cf80c9ed752968116c87ec0f07ca5671b93ede8c558fba3d34e92e549f7f573be6cc72f
-
C:\Users\Admin\AppData\Local\Temp\._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe
Filesize584KB
MD525b1052f544cdf4c57ae8b90d83df1ac
SHA12b1d50060504fd8ec7cbeea25ac4774128ca014e
SHA256a9ff0dd4a5ee46d64169a605a859d69f39b135df8bcc8a20b5a2c693aae65666
SHA512bc438cdcf7d7a8a74f57265f9bdc625373a6c0eb11ff9eac431ccf86abab4b6f18ee268108e1ef2053ca367c79385a159da80c7fa837cdf580e945c2e82cb584
-
C:\Users\Admin\AppData\Local\Temp\._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe
Filesize584KB
MD525b1052f544cdf4c57ae8b90d83df1ac
SHA12b1d50060504fd8ec7cbeea25ac4774128ca014e
SHA256a9ff0dd4a5ee46d64169a605a859d69f39b135df8bcc8a20b5a2c693aae65666
SHA512bc438cdcf7d7a8a74f57265f9bdc625373a6c0eb11ff9eac431ccf86abab4b6f18ee268108e1ef2053ca367c79385a159da80c7fa837cdf580e945c2e82cb584
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
751KB
MD529e1b0ddfb7e090b081d2c5b21f1f0d7
SHA12ffd30e5347bb398aa9e2901c4fb1cdac445fc4a
SHA25611aa613976974b09005557a265e789da94ef8b90827f394272f8dd0905544a45
SHA512c0ccf9dea3db739800ddd5e565d2b5b97fcf03345881253423d411215cf80c9ed752968116c87ec0f07ca5671b93ede8c558fba3d34e92e549f7f573be6cc72f
-
Filesize
751KB
MD529e1b0ddfb7e090b081d2c5b21f1f0d7
SHA12ffd30e5347bb398aa9e2901c4fb1cdac445fc4a
SHA25611aa613976974b09005557a265e789da94ef8b90827f394272f8dd0905544a45
SHA512c0ccf9dea3db739800ddd5e565d2b5b97fcf03345881253423d411215cf80c9ed752968116c87ec0f07ca5671b93ede8c558fba3d34e92e549f7f573be6cc72f
-
\Users\Admin\AppData\Local\Temp\._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe
Filesize584KB
MD525b1052f544cdf4c57ae8b90d83df1ac
SHA12b1d50060504fd8ec7cbeea25ac4774128ca014e
SHA256a9ff0dd4a5ee46d64169a605a859d69f39b135df8bcc8a20b5a2c693aae65666
SHA512bc438cdcf7d7a8a74f57265f9bdc625373a6c0eb11ff9eac431ccf86abab4b6f18ee268108e1ef2053ca367c79385a159da80c7fa837cdf580e945c2e82cb584
-
\Users\Admin\AppData\Local\Temp\._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe
Filesize584KB
MD525b1052f544cdf4c57ae8b90d83df1ac
SHA12b1d50060504fd8ec7cbeea25ac4774128ca014e
SHA256a9ff0dd4a5ee46d64169a605a859d69f39b135df8bcc8a20b5a2c693aae65666
SHA512bc438cdcf7d7a8a74f57265f9bdc625373a6c0eb11ff9eac431ccf86abab4b6f18ee268108e1ef2053ca367c79385a159da80c7fa837cdf580e945c2e82cb584