Analysis
-
max time kernel
152s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
17-07-2022 04:01
Static task
static1
Behavioral task
behavioral1
Sample
521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe
Resource
win10v2004-20220414-en
General
-
Target
521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe
-
Size
380KB
-
MD5
cefeba2bba1776d8b904415f52e14b7f
-
SHA1
733ab20ca21d86cd9a5fe4722c11783e51f88c9f
-
SHA256
521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e
-
SHA512
c869434f72fecc2b183ffd7d768a891a99e46d323a7f48da4db097f0a13e3510c3279ad8209b5ac2a6249c642ffb3ab749d4b225af5f6e2ee551e235b668c18e
Malware Config
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\MeasureCompress.tif => C:\Users\Admin\Pictures\MeasureCompress.tif.PPTX 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File renamed C:\Users\Admin\Pictures\MeasureInitialize.raw => C:\Users\Admin\Pictures\MeasureInitialize.raw.PPTX 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Admin\Pictures\OpenSync.tiff 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File renamed C:\Users\Admin\Pictures\OpenSync.tiff => C:\Users\Admin\Pictures\OpenSync.tiff.PPTX 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File renamed C:\Users\Admin\Pictures\PopSelect.crw => C:\Users\Admin\Pictures\PopSelect.crw.PPTX 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Admin\Pictures\SwitchRead.tiff 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File renamed C:\Users\Admin\Pictures\SwitchRead.tiff => C:\Users\Admin\Pictures\SwitchRead.tiff.PPTX 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File renamed C:\Users\Admin\Pictures\InvokeOpen.raw => C:\Users\Admin\Pictures\InvokeOpen.raw.PPTX 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe" 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe -
Drops desktop.ini file(s) 27 IoCs
description ioc Process File opened for modification C:\Users\Public\Videos\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Public\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Admin\Links\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Public\Documents\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Admin\Music\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Public\Music\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\AppConfigurationInternal.zip 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSODCW.DLL 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL011.XML 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ExpenseReport.xltx 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\READ_ME.txt 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSRTEDIT.DLL 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\PRODIGY.NET.XML 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSQRY32.EXE 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.COM.MX.XML 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\WANS.NET.XML 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\Presentation Designs\Maple.gif 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ContemporaryPhotoAlbum.potx 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OEMPRINT.CAT 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\MSPUB7.BDR 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\OriginResume.Dotx 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IMPMAIL.DLL 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSSP7ES.DLL 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CharSetTable.chr 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL096.XML 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\READ_ME.txt 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\MSPUB3B.BDR 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\AppConfig.zip 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\SynchronizationEula.rtf 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\sqlceme35.dll 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Issues.accdt 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OCRVC.DAT 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PG_INDEX.XML 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL092.XML 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\TimeCard.xltx 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BAN98.POC 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BIZFORM.XML 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGSTORY.XML 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\TALK21.COM.XML 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FRENCH.LNG 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGNAVBAR.DPV 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\PROGRAM.XML 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN027.XML 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\GREET11.POC 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1036\MSGR3FR.DLL 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendToOneNote.gpd 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Wordcnvpxy.cnv 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\GIFT98.POC 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\MENU98.POC 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\Microsoft.VisualStudio.Tools.Applications.DesignTime.dll 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\Synchronization.dll 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Status.accft 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SplashScreen.bmp 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OARTCONV.DLL 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OFFOWC.DLL 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.COM.MY.XML 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\sqlceoledb35.dll 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\sqlceqp35.dll 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\LoanAmortization.xltx 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSN.ICO 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSHY7FR.DLL 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\OriginFax.Dotx 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\STORYVERTBB.POC 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NAMECONTROLPROXY.DLL 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\MSPUB8.BDR 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.COM.XML 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\WEBHOME.POC 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\Interface.zip 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\SalesReport.xltx 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONFILTER.DLL 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1948 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1948 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1908 1948 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe 26 PID 1948 wrote to memory of 1908 1948 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe 26 PID 1948 wrote to memory of 1908 1948 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe 26 PID 1948 wrote to memory of 1908 1948 521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe"C:\Users\Admin\AppData\Local\Temp\521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe"1⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1908
-