Analysis
-
max time kernel
152s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 12:12
Behavioral task
behavioral1
Sample
0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe
Resource
win10v2004-20220812-en
General
-
Target
0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe
-
Size
6.1MB
-
MD5
d98937a2f7ecd006b3e558d99d25b496
-
SHA1
face3450c838788cdfeda5b342bca935c1d2929a
-
SHA256
0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c
-
SHA512
2d5653e730cf34942856f210e9480ec454561e039424d0bb1bdf9896be7551200ab719b89b7f7431c176857a1353c4695ef55cfd97ddc044c5609594db0a604b
-
SSDEEP
24576:HYGT5+s+NDjXNhDJDSz5RxKje6oROuIWKYZXJ1GhEF:4GgDn9hDm5XOHk64H
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Security Protection = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe" 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe File opened (read-only) \??\E: 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe File opened (read-only) \??\F: 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe File opened (read-only) \??\I: 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe File opened (read-only) \??\J: 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe File opened (read-only) \??\O: 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe File opened (read-only) \??\Q: 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe File opened (read-only) \??\S: 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe File opened (read-only) \??\L: 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe File opened (read-only) \??\M: 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe File opened (read-only) \??\N: 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe File opened (read-only) \??\T: 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe File opened (read-only) \??\U: 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe File opened (read-only) \??\W: 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe File opened (read-only) \??\Z: 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe File opened (read-only) \??\G: 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe File opened (read-only) \??\H: 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe File opened (read-only) \??\K: 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe File opened (read-only) \??\P: 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe File opened (read-only) \??\R: 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe File opened (read-only) \??\V: 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe File opened (read-only) \??\Y: 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,41484365,39965824,7153487,17110988,17962391,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\all\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\TrustCenter\Experimentation OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\ExternalFeatureOverrides\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\officeclicktorun\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\officeclicktorun\Overrides OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\Overrides OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "2" OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\TrustCenter\Experimentation OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\all\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\FirstSession\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\FirstSession\officeclicktorun OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "1" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 50,1329 10,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\Overrides OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "2" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\ExternalFeatureOverrides\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,17110992,7202269,41484365,17110988,7153487,39965824,17962391,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 4152 sihost.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 4024 sihost.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 3800 sihost.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2244 sihost.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 3424 sihost.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 4752 sihost.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 2024 0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe 3480 OfficeClickToRun.exe 552 OfficeClickToRun.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe"C:\Users\Admin\AppData\Local\Temp\0e7d6b63d861c3636d65895531ade02c724458e86dc8d37b1afabff1e13e6b5c.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2024
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Suspicious use of FindShellTrayWindow
PID:4152
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3480
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Suspicious use of FindShellTrayWindow
PID:4024
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:552
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Suspicious use of FindShellTrayWindow
PID:3800
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Suspicious use of FindShellTrayWindow
PID:2244
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Suspicious use of FindShellTrayWindow
PID:3424
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Suspicious use of FindShellTrayWindow
PID:4752