Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-09-2022 10:53
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp.exe
-
Size
362KB
-
MD5
af50ecd46089929f90385f6c90000c20
-
SHA1
9ae6f31c8f5b7f3b8c25d24bfe82c704b205beca
-
SHA256
a985a64aa7b6f5175e0f4e47b0eb41db10b2cb1236862f4610bcd09ead2fe663
-
SHA512
415a0a208b1ce87d2f43f4ff735afbc25ae4b6bfb683d39bca1ef8c6e81a07f9403182eebac912414da8fecef510375a8d4bb78b4934cd9dfcc3e53dc2a59259
-
SSDEEP
3072:N8jSZi34eTzl5IVp7Kw9ftm0dmNk7pzyEO05SVp14aJiwFXr:quZ5e65Q0djzKtawF7
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 2 IoCs
resource yara_rule behavioral1/memory/932-61-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet behavioral1/memory/1536-76-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Downloads MZ/PE file
-
Executes dropped EXE 12 IoCs
pid Process 572 computer.exe 1536 ._cache_computer.exe 1796 Synaptics.exe 316 Terms.exe 1880 computer.exe 1276 ._cache_computer.exe 1684 Synaptics.exe 1400 Peahrfb.exe 752 Terms.exe 988 Peahrfb.exe 1368 computer.exe 1764 ._cache_computer.exe -
Loads dropped DLL 19 IoCs
pid Process 932 tmp.exe 932 tmp.exe 572 computer.exe 572 computer.exe 572 computer.exe 572 computer.exe 572 computer.exe 316 Terms.exe 316 Terms.exe 1880 computer.exe 1880 computer.exe 1880 computer.exe 1880 computer.exe 752 Terms.exe 752 Terms.exe 1368 computer.exe 1368 computer.exe 1368 computer.exe 1368 computer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" computer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" computer.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: tmp.exe File opened (read-only) \??\J: tmp.exe File opened (read-only) \??\U: ._cache_computer.exe File opened (read-only) \??\B: ._cache_computer.exe File opened (read-only) \??\S: ._cache_computer.exe File opened (read-only) \??\Q: tmp.exe File opened (read-only) \??\F: ._cache_computer.exe File opened (read-only) \??\K: ._cache_computer.exe File opened (read-only) \??\L: ._cache_computer.exe File opened (read-only) \??\U: ._cache_computer.exe File opened (read-only) \??\Z: ._cache_computer.exe File opened (read-only) \??\B: tmp.exe File opened (read-only) \??\W: tmp.exe File opened (read-only) \??\O: ._cache_computer.exe File opened (read-only) \??\J: ._cache_computer.exe File opened (read-only) \??\N: ._cache_computer.exe File opened (read-only) \??\P: ._cache_computer.exe File opened (read-only) \??\Q: ._cache_computer.exe File opened (read-only) \??\T: ._cache_computer.exe File opened (read-only) \??\I: tmp.exe File opened (read-only) \??\N: tmp.exe File opened (read-only) \??\X: tmp.exe File opened (read-only) \??\E: ._cache_computer.exe File opened (read-only) \??\K: ._cache_computer.exe File opened (read-only) \??\N: ._cache_computer.exe File opened (read-only) \??\H: tmp.exe File opened (read-only) \??\B: ._cache_computer.exe File opened (read-only) \??\R: ._cache_computer.exe File opened (read-only) \??\P: ._cache_computer.exe File opened (read-only) \??\F: tmp.exe File opened (read-only) \??\G: tmp.exe File opened (read-only) \??\O: tmp.exe File opened (read-only) \??\V: tmp.exe File opened (read-only) \??\Y: ._cache_computer.exe File opened (read-only) \??\O: ._cache_computer.exe File opened (read-only) \??\H: ._cache_computer.exe File opened (read-only) \??\L: ._cache_computer.exe File opened (read-only) \??\X: ._cache_computer.exe File opened (read-only) \??\Z: ._cache_computer.exe File opened (read-only) \??\G: ._cache_computer.exe File opened (read-only) \??\I: ._cache_computer.exe File opened (read-only) \??\G: ._cache_computer.exe File opened (read-only) \??\I: ._cache_computer.exe File opened (read-only) \??\V: ._cache_computer.exe File opened (read-only) \??\W: ._cache_computer.exe File opened (read-only) \??\R: ._cache_computer.exe File opened (read-only) \??\Y: ._cache_computer.exe File opened (read-only) \??\U: tmp.exe File opened (read-only) \??\S: ._cache_computer.exe File opened (read-only) \??\V: ._cache_computer.exe File opened (read-only) \??\X: ._cache_computer.exe File opened (read-only) \??\M: tmp.exe File opened (read-only) \??\P: tmp.exe File opened (read-only) \??\S: tmp.exe File opened (read-only) \??\M: ._cache_computer.exe File opened (read-only) \??\E: ._cache_computer.exe File opened (read-only) \??\J: ._cache_computer.exe File opened (read-only) \??\L: tmp.exe File opened (read-only) \??\T: tmp.exe File opened (read-only) \??\T: ._cache_computer.exe File opened (read-only) \??\H: ._cache_computer.exe File opened (read-only) \??\W: ._cache_computer.exe File opened (read-only) \??\Q: ._cache_computer.exe File opened (read-only) \??\K: tmp.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Terms.exe File created C:\Windows\SysWOW64\._cache_computer.exe computer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Terms.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_CF87DC3CD4D7D734E7613C483D179E8C Synaptics.exe File opened for modification C:\Windows\SysWOW64\._cache_computer.exe computer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Synaptics.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\exploror[2].exe Terms.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat ._cache_computer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA Synaptics.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA Synaptics.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\WinSl\L9\5\2022 Synaptics.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Peahrfb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Peahrfb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA Synaptics.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_CF87DC3CD4D7D734E7613C483D179E8C Synaptics.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\exploror[1].exe Terms.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\WinSl Synaptics.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat ._cache_computer.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\exploror[1].exe Terms.exe File opened for modification C:\Windows\SysWOW64\._cache_computer.exe computer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA Synaptics.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Terms.exe tmp.exe File created C:\Program Files (x86)\Microsoft Eeuaeq\Peahrfb.exe ._cache_computer.exe File opened for modification C:\Program Files (x86)\Microsoft Eeuaeq\Peahrfb.exe ._cache_computer.exe File created C:\Program Files (x86)\Microsoft Eeuaeq\Peahrfb.exe ._cache_computer.exe File opened for modification C:\Program Files (x86)\Microsoft Eeuaeq\Peahrfb.exe ._cache_computer.exe File created C:\Program Files (x86)\Terms.exe tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ._cache_computer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ._cache_computer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz tmp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ._cache_computer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ._cache_computer.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND EXCEL.EXE -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs Synaptics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D02D361-04BA-42BA-9A01-A7C6AD8F6F7B} Terms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Peahrfb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Synaptics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Peahrfb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates Synaptics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections ._cache_computer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Synaptics.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{596AB062-B4D2-4215-9F74-E9109B0A8153} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 01000000000000002065938e26c1d801 computer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{7B4A83B6-F704-4B77-8E3D-C6087E3A21D2} {BDDACB60-7657-47AE-8445-D23E1ACF82AE} 0xFFFF = 010000000000000080d1a88e26c1d801 computer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D02D361-04BA-42BA-9A01-A7C6AD8F6F7B}\WpadNetworkName = "Network 3" Peahrfb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D02D361-04BA-42BA-9A01-A7C6AD8F6F7B}\WpadNetworkName = "Network 3" Peahrfb.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 Synaptics.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Synaptics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft ._cache_computer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" ._cache_computer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D02D361-04BA-42BA-9A01-A7C6AD8F6F7B}\WpadDecisionReason = "1" Synaptics.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-d4-3e-86-19-d1\WpadDecisionTime = c0a6849d26c1d801 Synaptics.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-d4-3e-86-19-d1\WpadDecisionTime = 6062519326c1d801 Peahrfb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Peahrfb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs Synaptics.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Peahrfb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Peahrfb.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D02D361-04BA-42BA-9A01-A7C6AD8F6F7B}\WpadDecisionTime = 00cc249826c1d801 Terms.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D02D361-04BA-42BA-9A01-A7C6AD8F6F7B}\WpadNetworkName = "Network 3" ._cache_computer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{6C467336-8281-4E60-8204-430CED96822D} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 01000000000000002070a68e26c1d801 computer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Synaptics.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Peahrfb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D02D361-04BA-42BA-9A01-A7C6AD8F6F7B}\e6-d4-3e-86-19-d1 Peahrfb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs Synaptics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D02D361-04BA-42BA-9A01-A7C6AD8F6F7B}\WpadNetworkName = "Network 3" Terms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ._cache_computer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-d4-3e-86-19-d1 Terms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Peahrfb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Peahrfb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Terms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Terms.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-d4-3e-86-19-d1\WpadDetectedUrl Synaptics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs Synaptics.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D02D361-04BA-42BA-9A01-A7C6AD8F6F7B}\WpadDecision = "0" ._cache_computer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-d4-3e-86-19-d1\WpadDetectedUrl Peahrfb.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D02D361-04BA-42BA-9A01-A7C6AD8F6F7B}\WpadDecisionTime = 00a20d9d26c1d801 Peahrfb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates Synaptics.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000006000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Terms.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D02D361-04BA-42BA-9A01-A7C6AD8F6F7B}\WpadDecision = "0" Terms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA Synaptics.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" ._cache_computer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Synaptics.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D02D361-04BA-42BA-9A01-A7C6AD8F6F7B}\WpadDecision = "0" Synaptics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Terms.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ._cache_computer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D02D361-04BA-42BA-9A01-A7C6AD8F6F7B}\WpadDecisionReason = "1" ._cache_computer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Peahrfb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Terms.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D02D361-04BA-42BA-9A01-A7C6AD8F6F7B}\WpadDecision = "0" Peahrfb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" ._cache_computer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D02D361-04BA-42BA-9A01-A7C6AD8F6F7B}\e6-d4-3e-86-19-d1 ._cache_computer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs Synaptics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates Synaptics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople Synaptics.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-d4-3e-86-19-d1\WpadDecisionReason = "1" ._cache_computer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Peahrfb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Peahrfb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Terms.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1992 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 932 tmp.exe 316 Terms.exe 1276 ._cache_computer.exe 932 tmp.exe 1536 ._cache_computer.exe 752 Terms.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1992 EXCEL.EXE -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 932 wrote to memory of 1264 932 tmp.exe 27 PID 932 wrote to memory of 1264 932 tmp.exe 27 PID 932 wrote to memory of 1264 932 tmp.exe 27 PID 932 wrote to memory of 1264 932 tmp.exe 27 PID 932 wrote to memory of 572 932 tmp.exe 31 PID 932 wrote to memory of 572 932 tmp.exe 31 PID 932 wrote to memory of 572 932 tmp.exe 31 PID 932 wrote to memory of 572 932 tmp.exe 31 PID 572 wrote to memory of 1536 572 computer.exe 32 PID 572 wrote to memory of 1536 572 computer.exe 32 PID 572 wrote to memory of 1536 572 computer.exe 32 PID 572 wrote to memory of 1536 572 computer.exe 32 PID 572 wrote to memory of 1796 572 computer.exe 33 PID 572 wrote to memory of 1796 572 computer.exe 33 PID 572 wrote to memory of 1796 572 computer.exe 33 PID 572 wrote to memory of 1796 572 computer.exe 33 PID 316 wrote to memory of 1432 316 Terms.exe 36 PID 316 wrote to memory of 1432 316 Terms.exe 36 PID 316 wrote to memory of 1432 316 Terms.exe 36 PID 316 wrote to memory of 1432 316 Terms.exe 36 PID 316 wrote to memory of 1880 316 Terms.exe 40 PID 316 wrote to memory of 1880 316 Terms.exe 40 PID 316 wrote to memory of 1880 316 Terms.exe 40 PID 316 wrote to memory of 1880 316 Terms.exe 40 PID 1880 wrote to memory of 1276 1880 computer.exe 41 PID 1880 wrote to memory of 1276 1880 computer.exe 41 PID 1880 wrote to memory of 1276 1880 computer.exe 41 PID 1880 wrote to memory of 1276 1880 computer.exe 41 PID 1880 wrote to memory of 1684 1880 computer.exe 42 PID 1880 wrote to memory of 1684 1880 computer.exe 42 PID 1880 wrote to memory of 1684 1880 computer.exe 42 PID 1880 wrote to memory of 1684 1880 computer.exe 42 PID 316 wrote to memory of 752 316 Terms.exe 44 PID 316 wrote to memory of 752 316 Terms.exe 44 PID 316 wrote to memory of 752 316 Terms.exe 44 PID 316 wrote to memory of 752 316 Terms.exe 44 PID 752 wrote to memory of 916 752 Terms.exe 45 PID 752 wrote to memory of 916 752 Terms.exe 45 PID 752 wrote to memory of 916 752 Terms.exe 45 PID 752 wrote to memory of 916 752 Terms.exe 45 PID 1400 wrote to memory of 988 1400 Peahrfb.exe 47 PID 1400 wrote to memory of 988 1400 Peahrfb.exe 47 PID 1400 wrote to memory of 988 1400 Peahrfb.exe 47 PID 1400 wrote to memory of 988 1400 Peahrfb.exe 47 PID 752 wrote to memory of 1368 752 Terms.exe 48 PID 752 wrote to memory of 1368 752 Terms.exe 48 PID 752 wrote to memory of 1368 752 Terms.exe 48 PID 752 wrote to memory of 1368 752 Terms.exe 48 PID 1368 wrote to memory of 1764 1368 computer.exe 49 PID 1368 wrote to memory of 1764 1368 computer.exe 49 PID 1368 wrote to memory of 1764 1368 computer.exe 49 PID 1368 wrote to memory of 1764 1368 computer.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c md C:\windowss642⤵PID:1264
-
-
C:\windowss64\computer.exe"C:\windowss64\computer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe"C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe"3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:1796
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1992
-
C:\Program Files (x86)\Terms.exe"C:\Program Files (x86)\Terms.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c md C:\windowss642⤵PID:1432
-
-
C:\windowss64\computer.exe"C:\windowss64\computer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\._cache_computer.exe"C:\Windows\system32\._cache_computer.exe"3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1276
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1684
-
-
-
C:\Program Files (x86)\Terms.exe"C:\Program Files (x86)\Terms.exe" Win72⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c md C:\windowss643⤵PID:916
-
-
C:\windowss64\computer.exe"C:\windowss64\computer.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\._cache_computer.exe"C:\Windows\system32\._cache_computer.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1764
-
-
-
-
C:\Program Files (x86)\Microsoft Eeuaeq\Peahrfb.exe"C:\Program Files (x86)\Microsoft Eeuaeq\Peahrfb.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Program Files (x86)\Microsoft Eeuaeq\Peahrfb.exe"C:\Program Files (x86)\Microsoft Eeuaeq\Peahrfb.exe" Win72⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:988
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
400KB
MD5f82f50d6a61d3d73172fcbf3ff665e89
SHA12e5cde938a2822a13348e55f4ad0dfa75d545fee
SHA256afbf8e478edc3d239953a3653a5ec113363fb9406552536d6469581b52585bcd
SHA512f5945f9c5b4cfcd29498b24ec43000e6ec2927ec264d758aeeb4325f4c5f2b1d03fb997c84b38daec82b4a1dbc9f049b932ca399ef02778072cf594b1b5044fb
-
Filesize
400KB
MD5f82f50d6a61d3d73172fcbf3ff665e89
SHA12e5cde938a2822a13348e55f4ad0dfa75d545fee
SHA256afbf8e478edc3d239953a3653a5ec113363fb9406552536d6469581b52585bcd
SHA512f5945f9c5b4cfcd29498b24ec43000e6ec2927ec264d758aeeb4325f4c5f2b1d03fb997c84b38daec82b4a1dbc9f049b932ca399ef02778072cf594b1b5044fb
-
Filesize
400KB
MD5f82f50d6a61d3d73172fcbf3ff665e89
SHA12e5cde938a2822a13348e55f4ad0dfa75d545fee
SHA256afbf8e478edc3d239953a3653a5ec113363fb9406552536d6469581b52585bcd
SHA512f5945f9c5b4cfcd29498b24ec43000e6ec2927ec264d758aeeb4325f4c5f2b1d03fb997c84b38daec82b4a1dbc9f049b932ca399ef02778072cf594b1b5044fb
-
Filesize
362KB
MD5af50ecd46089929f90385f6c90000c20
SHA19ae6f31c8f5b7f3b8c25d24bfe82c704b205beca
SHA256a985a64aa7b6f5175e0f4e47b0eb41db10b2cb1236862f4610bcd09ead2fe663
SHA512415a0a208b1ce87d2f43f4ff735afbc25ae4b6bfb683d39bca1ef8c6e81a07f9403182eebac912414da8fecef510375a8d4bb78b4934cd9dfcc3e53dc2a59259
-
Filesize
362KB
MD5af50ecd46089929f90385f6c90000c20
SHA19ae6f31c8f5b7f3b8c25d24bfe82c704b205beca
SHA256a985a64aa7b6f5175e0f4e47b0eb41db10b2cb1236862f4610bcd09ead2fe663
SHA512415a0a208b1ce87d2f43f4ff735afbc25ae4b6bfb683d39bca1ef8c6e81a07f9403182eebac912414da8fecef510375a8d4bb78b4934cd9dfcc3e53dc2a59259
-
Filesize
362KB
MD5af50ecd46089929f90385f6c90000c20
SHA19ae6f31c8f5b7f3b8c25d24bfe82c704b205beca
SHA256a985a64aa7b6f5175e0f4e47b0eb41db10b2cb1236862f4610bcd09ead2fe663
SHA512415a0a208b1ce87d2f43f4ff735afbc25ae4b6bfb683d39bca1ef8c6e81a07f9403182eebac912414da8fecef510375a8d4bb78b4934cd9dfcc3e53dc2a59259
-
Filesize
754KB
MD5310a7ff41f6633132e6c2bc25e51e567
SHA15f687df8cc3185ed68d77d0e05502c2eb308c5c8
SHA256d1425edf482717cb64db2a36357866045b0c6306d919296591ffc9bc45d680ab
SHA512ee9b3114cb37e52793bccdf20a27158f5def67ed9c7d8eb772e1deaf5d5f9a0030e847dea40bb320637f29508f1be2a49c3095460a6fd3afbc3bca196f642980
-
Filesize
754KB
MD5310a7ff41f6633132e6c2bc25e51e567
SHA15f687df8cc3185ed68d77d0e05502c2eb308c5c8
SHA256d1425edf482717cb64db2a36357866045b0c6306d919296591ffc9bc45d680ab
SHA512ee9b3114cb37e52793bccdf20a27158f5def67ed9c7d8eb772e1deaf5d5f9a0030e847dea40bb320637f29508f1be2a49c3095460a6fd3afbc3bca196f642980
-
Filesize
754KB
MD5310a7ff41f6633132e6c2bc25e51e567
SHA15f687df8cc3185ed68d77d0e05502c2eb308c5c8
SHA256d1425edf482717cb64db2a36357866045b0c6306d919296591ffc9bc45d680ab
SHA512ee9b3114cb37e52793bccdf20a27158f5def67ed9c7d8eb772e1deaf5d5f9a0030e847dea40bb320637f29508f1be2a49c3095460a6fd3afbc3bca196f642980
-
Filesize
400KB
MD5f82f50d6a61d3d73172fcbf3ff665e89
SHA12e5cde938a2822a13348e55f4ad0dfa75d545fee
SHA256afbf8e478edc3d239953a3653a5ec113363fb9406552536d6469581b52585bcd
SHA512f5945f9c5b4cfcd29498b24ec43000e6ec2927ec264d758aeeb4325f4c5f2b1d03fb997c84b38daec82b4a1dbc9f049b932ca399ef02778072cf594b1b5044fb
-
Filesize
400KB
MD5f82f50d6a61d3d73172fcbf3ff665e89
SHA12e5cde938a2822a13348e55f4ad0dfa75d545fee
SHA256afbf8e478edc3d239953a3653a5ec113363fb9406552536d6469581b52585bcd
SHA512f5945f9c5b4cfcd29498b24ec43000e6ec2927ec264d758aeeb4325f4c5f2b1d03fb997c84b38daec82b4a1dbc9f049b932ca399ef02778072cf594b1b5044fb
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
400KB
MD5f82f50d6a61d3d73172fcbf3ff665e89
SHA12e5cde938a2822a13348e55f4ad0dfa75d545fee
SHA256afbf8e478edc3d239953a3653a5ec113363fb9406552536d6469581b52585bcd
SHA512f5945f9c5b4cfcd29498b24ec43000e6ec2927ec264d758aeeb4325f4c5f2b1d03fb997c84b38daec82b4a1dbc9f049b932ca399ef02778072cf594b1b5044fb
-
Filesize
400KB
MD5f82f50d6a61d3d73172fcbf3ff665e89
SHA12e5cde938a2822a13348e55f4ad0dfa75d545fee
SHA256afbf8e478edc3d239953a3653a5ec113363fb9406552536d6469581b52585bcd
SHA512f5945f9c5b4cfcd29498b24ec43000e6ec2927ec264d758aeeb4325f4c5f2b1d03fb997c84b38daec82b4a1dbc9f049b932ca399ef02778072cf594b1b5044fb
-
Filesize
400KB
MD5f82f50d6a61d3d73172fcbf3ff665e89
SHA12e5cde938a2822a13348e55f4ad0dfa75d545fee
SHA256afbf8e478edc3d239953a3653a5ec113363fb9406552536d6469581b52585bcd
SHA512f5945f9c5b4cfcd29498b24ec43000e6ec2927ec264d758aeeb4325f4c5f2b1d03fb997c84b38daec82b4a1dbc9f049b932ca399ef02778072cf594b1b5044fb
-
Filesize
1.1MB
MD5d6df53506b123f5717463d0355336979
SHA17720fb4b89a4ebcef32a6d6a9a7a88c65cad2c14
SHA25670969f1d56ec1ddcae3fc50545c0a351b798226c62d870db8ae5170eeec67694
SHA5121bfefa221ed77ef05fc72fbc20a322cae990b2a33a9af47b9ee4d9fa1c09d5c81f6a8fd8496ed43a47ee2862e1e2bf1651b4cca2f5e9e23e491c3d4b3249ad2f
-
Filesize
1.1MB
MD5d6df53506b123f5717463d0355336979
SHA17720fb4b89a4ebcef32a6d6a9a7a88c65cad2c14
SHA25670969f1d56ec1ddcae3fc50545c0a351b798226c62d870db8ae5170eeec67694
SHA5121bfefa221ed77ef05fc72fbc20a322cae990b2a33a9af47b9ee4d9fa1c09d5c81f6a8fd8496ed43a47ee2862e1e2bf1651b4cca2f5e9e23e491c3d4b3249ad2f
-
Filesize
1.1MB
MD5d6df53506b123f5717463d0355336979
SHA17720fb4b89a4ebcef32a6d6a9a7a88c65cad2c14
SHA25670969f1d56ec1ddcae3fc50545c0a351b798226c62d870db8ae5170eeec67694
SHA5121bfefa221ed77ef05fc72fbc20a322cae990b2a33a9af47b9ee4d9fa1c09d5c81f6a8fd8496ed43a47ee2862e1e2bf1651b4cca2f5e9e23e491c3d4b3249ad2f
-
Filesize
1.1MB
MD5d6df53506b123f5717463d0355336979
SHA17720fb4b89a4ebcef32a6d6a9a7a88c65cad2c14
SHA25670969f1d56ec1ddcae3fc50545c0a351b798226c62d870db8ae5170eeec67694
SHA5121bfefa221ed77ef05fc72fbc20a322cae990b2a33a9af47b9ee4d9fa1c09d5c81f6a8fd8496ed43a47ee2862e1e2bf1651b4cca2f5e9e23e491c3d4b3249ad2f
-
Filesize
1.1MB
MD5d6df53506b123f5717463d0355336979
SHA17720fb4b89a4ebcef32a6d6a9a7a88c65cad2c14
SHA25670969f1d56ec1ddcae3fc50545c0a351b798226c62d870db8ae5170eeec67694
SHA5121bfefa221ed77ef05fc72fbc20a322cae990b2a33a9af47b9ee4d9fa1c09d5c81f6a8fd8496ed43a47ee2862e1e2bf1651b4cca2f5e9e23e491c3d4b3249ad2f
-
Filesize
1.1MB
MD5d6df53506b123f5717463d0355336979
SHA17720fb4b89a4ebcef32a6d6a9a7a88c65cad2c14
SHA25670969f1d56ec1ddcae3fc50545c0a351b798226c62d870db8ae5170eeec67694
SHA5121bfefa221ed77ef05fc72fbc20a322cae990b2a33a9af47b9ee4d9fa1c09d5c81f6a8fd8496ed43a47ee2862e1e2bf1651b4cca2f5e9e23e491c3d4b3249ad2f
-
Filesize
754KB
MD5310a7ff41f6633132e6c2bc25e51e567
SHA15f687df8cc3185ed68d77d0e05502c2eb308c5c8
SHA256d1425edf482717cb64db2a36357866045b0c6306d919296591ffc9bc45d680ab
SHA512ee9b3114cb37e52793bccdf20a27158f5def67ed9c7d8eb772e1deaf5d5f9a0030e847dea40bb320637f29508f1be2a49c3095460a6fd3afbc3bca196f642980
-
Filesize
754KB
MD5310a7ff41f6633132e6c2bc25e51e567
SHA15f687df8cc3185ed68d77d0e05502c2eb308c5c8
SHA256d1425edf482717cb64db2a36357866045b0c6306d919296591ffc9bc45d680ab
SHA512ee9b3114cb37e52793bccdf20a27158f5def67ed9c7d8eb772e1deaf5d5f9a0030e847dea40bb320637f29508f1be2a49c3095460a6fd3afbc3bca196f642980
-
Filesize
754KB
MD5310a7ff41f6633132e6c2bc25e51e567
SHA15f687df8cc3185ed68d77d0e05502c2eb308c5c8
SHA256d1425edf482717cb64db2a36357866045b0c6306d919296591ffc9bc45d680ab
SHA512ee9b3114cb37e52793bccdf20a27158f5def67ed9c7d8eb772e1deaf5d5f9a0030e847dea40bb320637f29508f1be2a49c3095460a6fd3afbc3bca196f642980
-
Filesize
400KB
MD5f82f50d6a61d3d73172fcbf3ff665e89
SHA12e5cde938a2822a13348e55f4ad0dfa75d545fee
SHA256afbf8e478edc3d239953a3653a5ec113363fb9406552536d6469581b52585bcd
SHA512f5945f9c5b4cfcd29498b24ec43000e6ec2927ec264d758aeeb4325f4c5f2b1d03fb997c84b38daec82b4a1dbc9f049b932ca399ef02778072cf594b1b5044fb
-
Filesize
400KB
MD5f82f50d6a61d3d73172fcbf3ff665e89
SHA12e5cde938a2822a13348e55f4ad0dfa75d545fee
SHA256afbf8e478edc3d239953a3653a5ec113363fb9406552536d6469581b52585bcd
SHA512f5945f9c5b4cfcd29498b24ec43000e6ec2927ec264d758aeeb4325f4c5f2b1d03fb997c84b38daec82b4a1dbc9f049b932ca399ef02778072cf594b1b5044fb
-
Filesize
400KB
MD5f82f50d6a61d3d73172fcbf3ff665e89
SHA12e5cde938a2822a13348e55f4ad0dfa75d545fee
SHA256afbf8e478edc3d239953a3653a5ec113363fb9406552536d6469581b52585bcd
SHA512f5945f9c5b4cfcd29498b24ec43000e6ec2927ec264d758aeeb4325f4c5f2b1d03fb997c84b38daec82b4a1dbc9f049b932ca399ef02778072cf594b1b5044fb
-
Filesize
400KB
MD5f82f50d6a61d3d73172fcbf3ff665e89
SHA12e5cde938a2822a13348e55f4ad0dfa75d545fee
SHA256afbf8e478edc3d239953a3653a5ec113363fb9406552536d6469581b52585bcd
SHA512f5945f9c5b4cfcd29498b24ec43000e6ec2927ec264d758aeeb4325f4c5f2b1d03fb997c84b38daec82b4a1dbc9f049b932ca399ef02778072cf594b1b5044fb
-
Filesize
400KB
MD5f82f50d6a61d3d73172fcbf3ff665e89
SHA12e5cde938a2822a13348e55f4ad0dfa75d545fee
SHA256afbf8e478edc3d239953a3653a5ec113363fb9406552536d6469581b52585bcd
SHA512f5945f9c5b4cfcd29498b24ec43000e6ec2927ec264d758aeeb4325f4c5f2b1d03fb997c84b38daec82b4a1dbc9f049b932ca399ef02778072cf594b1b5044fb
-
Filesize
400KB
MD5f82f50d6a61d3d73172fcbf3ff665e89
SHA12e5cde938a2822a13348e55f4ad0dfa75d545fee
SHA256afbf8e478edc3d239953a3653a5ec113363fb9406552536d6469581b52585bcd
SHA512f5945f9c5b4cfcd29498b24ec43000e6ec2927ec264d758aeeb4325f4c5f2b1d03fb997c84b38daec82b4a1dbc9f049b932ca399ef02778072cf594b1b5044fb
-
Filesize
400KB
MD5f82f50d6a61d3d73172fcbf3ff665e89
SHA12e5cde938a2822a13348e55f4ad0dfa75d545fee
SHA256afbf8e478edc3d239953a3653a5ec113363fb9406552536d6469581b52585bcd
SHA512f5945f9c5b4cfcd29498b24ec43000e6ec2927ec264d758aeeb4325f4c5f2b1d03fb997c84b38daec82b4a1dbc9f049b932ca399ef02778072cf594b1b5044fb
-
Filesize
1.1MB
MD5d6df53506b123f5717463d0355336979
SHA17720fb4b89a4ebcef32a6d6a9a7a88c65cad2c14
SHA25670969f1d56ec1ddcae3fc50545c0a351b798226c62d870db8ae5170eeec67694
SHA5121bfefa221ed77ef05fc72fbc20a322cae990b2a33a9af47b9ee4d9fa1c09d5c81f6a8fd8496ed43a47ee2862e1e2bf1651b4cca2f5e9e23e491c3d4b3249ad2f
-
Filesize
1.1MB
MD5d6df53506b123f5717463d0355336979
SHA17720fb4b89a4ebcef32a6d6a9a7a88c65cad2c14
SHA25670969f1d56ec1ddcae3fc50545c0a351b798226c62d870db8ae5170eeec67694
SHA5121bfefa221ed77ef05fc72fbc20a322cae990b2a33a9af47b9ee4d9fa1c09d5c81f6a8fd8496ed43a47ee2862e1e2bf1651b4cca2f5e9e23e491c3d4b3249ad2f
-
Filesize
1.1MB
MD5d6df53506b123f5717463d0355336979
SHA17720fb4b89a4ebcef32a6d6a9a7a88c65cad2c14
SHA25670969f1d56ec1ddcae3fc50545c0a351b798226c62d870db8ae5170eeec67694
SHA5121bfefa221ed77ef05fc72fbc20a322cae990b2a33a9af47b9ee4d9fa1c09d5c81f6a8fd8496ed43a47ee2862e1e2bf1651b4cca2f5e9e23e491c3d4b3249ad2f
-
Filesize
1.1MB
MD5d6df53506b123f5717463d0355336979
SHA17720fb4b89a4ebcef32a6d6a9a7a88c65cad2c14
SHA25670969f1d56ec1ddcae3fc50545c0a351b798226c62d870db8ae5170eeec67694
SHA5121bfefa221ed77ef05fc72fbc20a322cae990b2a33a9af47b9ee4d9fa1c09d5c81f6a8fd8496ed43a47ee2862e1e2bf1651b4cca2f5e9e23e491c3d4b3249ad2f
-
Filesize
1.1MB
MD5d6df53506b123f5717463d0355336979
SHA17720fb4b89a4ebcef32a6d6a9a7a88c65cad2c14
SHA25670969f1d56ec1ddcae3fc50545c0a351b798226c62d870db8ae5170eeec67694
SHA5121bfefa221ed77ef05fc72fbc20a322cae990b2a33a9af47b9ee4d9fa1c09d5c81f6a8fd8496ed43a47ee2862e1e2bf1651b4cca2f5e9e23e491c3d4b3249ad2f
-
Filesize
1.1MB
MD5d6df53506b123f5717463d0355336979
SHA17720fb4b89a4ebcef32a6d6a9a7a88c65cad2c14
SHA25670969f1d56ec1ddcae3fc50545c0a351b798226c62d870db8ae5170eeec67694
SHA5121bfefa221ed77ef05fc72fbc20a322cae990b2a33a9af47b9ee4d9fa1c09d5c81f6a8fd8496ed43a47ee2862e1e2bf1651b4cca2f5e9e23e491c3d4b3249ad2f
-
Filesize
1.1MB
MD5d6df53506b123f5717463d0355336979
SHA17720fb4b89a4ebcef32a6d6a9a7a88c65cad2c14
SHA25670969f1d56ec1ddcae3fc50545c0a351b798226c62d870db8ae5170eeec67694
SHA5121bfefa221ed77ef05fc72fbc20a322cae990b2a33a9af47b9ee4d9fa1c09d5c81f6a8fd8496ed43a47ee2862e1e2bf1651b4cca2f5e9e23e491c3d4b3249ad2f
-
Filesize
1.1MB
MD5d6df53506b123f5717463d0355336979
SHA17720fb4b89a4ebcef32a6d6a9a7a88c65cad2c14
SHA25670969f1d56ec1ddcae3fc50545c0a351b798226c62d870db8ae5170eeec67694
SHA5121bfefa221ed77ef05fc72fbc20a322cae990b2a33a9af47b9ee4d9fa1c09d5c81f6a8fd8496ed43a47ee2862e1e2bf1651b4cca2f5e9e23e491c3d4b3249ad2f
-
Filesize
1.1MB
MD5d6df53506b123f5717463d0355336979
SHA17720fb4b89a4ebcef32a6d6a9a7a88c65cad2c14
SHA25670969f1d56ec1ddcae3fc50545c0a351b798226c62d870db8ae5170eeec67694
SHA5121bfefa221ed77ef05fc72fbc20a322cae990b2a33a9af47b9ee4d9fa1c09d5c81f6a8fd8496ed43a47ee2862e1e2bf1651b4cca2f5e9e23e491c3d4b3249ad2f