Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 04:49
Behavioral task
behavioral1
Sample
7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe
Resource
win10v2004-20220901-en
General
-
Target
7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe
-
Size
42KB
-
MD5
44eb3d88f54f445d6896f99d23c055a9
-
SHA1
4076dc5fff3f965a02e505dad1217cbba5717a7e
-
SHA256
7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f
-
SHA512
39b976bad403e2a1454d8273791e39533e91ef80753e0c2b5f41cef33e18f3d2d1c164077e9338b7c88cfd528cc00a390fc2f337a603a8f7959ba80bdde34037
-
SSDEEP
768:gSz0/XBwayCUOwV3TNZHdrPeqzEWvpbPwSMX6+w6pqZxLdeVgol9D8888888888l:BzOCay4wV339rPjzbpLwRJ9pSdoII
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\Fonts\\\u00a0Explorer.exe\"" CTFMON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" CTFMON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\Fonts\\\u00a0Explorer.exe\"" SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\Fonts\\\u00a0Explorer.exe\"" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\Fonts\\\u00a0Explorer.exe\"" 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" CTFMON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SPOOLSV.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SVCHOST.EXE -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SVCHOST.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" CTFMON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SPOOLSV.EXE -
resource yara_rule behavioral2/files/0x0001000000022df3-139.dat aspack_v212_v242 behavioral2/files/0x0001000000022df3-140.dat aspack_v212_v242 behavioral2/files/0x0001000000022df7-143.dat aspack_v212_v242 behavioral2/files/0x0001000000022df3-146.dat aspack_v212_v242 behavioral2/files/0x0001000000022df4-154.dat aspack_v212_v242 behavioral2/files/0x0001000000022df4-153.dat aspack_v212_v242 behavioral2/files/0x0001000000022df7-157.dat aspack_v212_v242 behavioral2/files/0x0001000000022df3-160.dat aspack_v212_v242 behavioral2/files/0x0001000000022df4-165.dat aspack_v212_v242 behavioral2/files/0x0001000000022df5-170.dat aspack_v212_v242 behavioral2/files/0x0001000000022df5-171.dat aspack_v212_v242 behavioral2/files/0x0001000000022df7-174.dat aspack_v212_v242 behavioral2/files/0x0001000000022df3-177.dat aspack_v212_v242 behavioral2/files/0x0001000000022df4-181.dat aspack_v212_v242 behavioral2/files/0x0001000000022df5-190.dat aspack_v212_v242 behavioral2/files/0x0001000000022df5-195.dat aspack_v212_v242 behavioral2/files/0x0001000000022df4-200.dat aspack_v212_v242 behavioral2/files/0x0001000000022df5-205.dat aspack_v212_v242 -
Executes dropped EXE 12 IoCs
pid Process 4512 SVCHOST.EXE 4216 SVCHOST.EXE 2896 SPOOLSV.EXE 2840 SVCHOST.EXE 1928 SPOOLSV.EXE 4212 CTFMON.EXE 204 SVCHOST.EXE 3692 SPOOLSV.EXE 1444 CTFMON.EXE 3080 CTFMON.EXE 936 SPOOLSV.EXE 4892 CTFMON.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Recycled\desktop.ini 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: SVCHOST.EXE File opened (read-only) \??\J: SPOOLSV.EXE File opened (read-only) \??\S: CTFMON.EXE File opened (read-only) \??\G: 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe File opened (read-only) \??\S: SVCHOST.EXE File opened (read-only) \??\Y: SVCHOST.EXE File opened (read-only) \??\I: SPOOLSV.EXE File opened (read-only) \??\K: 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe File opened (read-only) \??\R: 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe File opened (read-only) \??\W: 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe File opened (read-only) \??\R: SVCHOST.EXE File opened (read-only) \??\K: SPOOLSV.EXE File opened (read-only) \??\M: CTFMON.EXE File opened (read-only) \??\P: 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe File opened (read-only) \??\E: SVCHOST.EXE File opened (read-only) \??\Q: SVCHOST.EXE File opened (read-only) \??\V: SVCHOST.EXE File opened (read-only) \??\L: SPOOLSV.EXE File opened (read-only) \??\J: 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe File opened (read-only) \??\S: 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe File opened (read-only) \??\O: SVCHOST.EXE File opened (read-only) \??\M: SPOOLSV.EXE File opened (read-only) \??\L: CTFMON.EXE File opened (read-only) \??\F: SVCHOST.EXE File opened (read-only) \??\G: SVCHOST.EXE File opened (read-only) \??\U: SPOOLSV.EXE File opened (read-only) \??\E: CTFMON.EXE File opened (read-only) \??\G: CTFMON.EXE File opened (read-only) \??\F: 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe File opened (read-only) \??\L: SVCHOST.EXE File opened (read-only) \??\E: SPOOLSV.EXE File opened (read-only) \??\Q: SPOOLSV.EXE File opened (read-only) \??\V: SPOOLSV.EXE File opened (read-only) \??\O: CTFMON.EXE File opened (read-only) \??\W: CTFMON.EXE File opened (read-only) \??\E: 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe File opened (read-only) \??\Z: 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe File opened (read-only) \??\G: SPOOLSV.EXE File opened (read-only) \??\T: SPOOLSV.EXE File opened (read-only) \??\L: 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe File opened (read-only) \??\Q: 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe File opened (read-only) \??\M: SVCHOST.EXE File opened (read-only) \??\P: SVCHOST.EXE File opened (read-only) \??\S: SPOOLSV.EXE File opened (read-only) \??\Y: CTFMON.EXE File opened (read-only) \??\V: 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe File opened (read-only) \??\H: SPOOLSV.EXE File opened (read-only) \??\N: SPOOLSV.EXE File opened (read-only) \??\P: SPOOLSV.EXE File opened (read-only) \??\Y: SPOOLSV.EXE File opened (read-only) \??\Z: SPOOLSV.EXE File opened (read-only) \??\N: CTFMON.EXE File opened (read-only) \??\F: SPOOLSV.EXE File opened (read-only) \??\N: 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe File opened (read-only) \??\O: 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe File opened (read-only) \??\U: 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe File opened (read-only) \??\I: SVCHOST.EXE File opened (read-only) \??\J: SVCHOST.EXE File opened (read-only) \??\K: SVCHOST.EXE File opened (read-only) \??\N: SVCHOST.EXE File opened (read-only) \??\X: SPOOLSV.EXE File opened (read-only) \??\Q: CTFMON.EXE File opened (read-only) \??\Z: SVCHOST.EXE File opened (read-only) \??\F: CTFMON.EXE -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\Root\VFS\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\docicon.exe 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\ Explorer.exe SPOOLSV.EXE File opened for modification C:\Windows\Fonts\ Explorer.exe CTFMON.EXE File opened for modification C:\Windows\Fonts\ Explorer.exe 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe File opened for modification C:\Windows\Fonts\ Explorer.exe SVCHOST.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 29 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\*\InfoTip = "prop:Type;Write;Size" 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\*\QuickTip = "prop:Type;Size" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" CTFMON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\CONFIG 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\INSTALL 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\*\InfoTip = "prop:Type;Write;Size" SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\*\TileInfo = "prop:Type;Size" CTFMON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\*\QuickTip = "prop:Type;Size" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\*\TileInfo = "prop:Type;Size" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\*\InfoTip = "prop:Type;Write;Size" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\INSTALL\COMMAND 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\*\QuickTip = "prop:Type;Size" 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\*\QuickTip = "prop:Type;Size" CTFMON.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\CONFIG\COMMAND 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\*\TileInfo = "prop:Type;Size" 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\*\TileInfo = "prop:Type;Size" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" CTFMON.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ CTFMON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\*\InfoTip = "prop:Type;Write;Size" CTFMON.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4448 WINWORD.EXE 4448 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2896 SPOOLSV.EXE 2896 SPOOLSV.EXE 4212 CTFMON.EXE 4212 CTFMON.EXE 2896 SPOOLSV.EXE 2896 SPOOLSV.EXE 4212 CTFMON.EXE 4212 CTFMON.EXE 2896 SPOOLSV.EXE 2896 SPOOLSV.EXE 4212 CTFMON.EXE 4212 CTFMON.EXE 2896 SPOOLSV.EXE 2896 SPOOLSV.EXE 4212 CTFMON.EXE 4212 CTFMON.EXE 2896 SPOOLSV.EXE 2896 SPOOLSV.EXE 4212 CTFMON.EXE 4212 CTFMON.EXE 2896 SPOOLSV.EXE 4212 CTFMON.EXE 4212 CTFMON.EXE 2896 SPOOLSV.EXE 4512 SVCHOST.EXE 4512 SVCHOST.EXE 4512 SVCHOST.EXE 4512 SVCHOST.EXE 4512 SVCHOST.EXE 4512 SVCHOST.EXE 4512 SVCHOST.EXE 4512 SVCHOST.EXE 4512 SVCHOST.EXE 4512 SVCHOST.EXE 4512 SVCHOST.EXE 4512 SVCHOST.EXE 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 4212 CTFMON.EXE 4212 CTFMON.EXE 2896 SPOOLSV.EXE 2896 SPOOLSV.EXE 4212 CTFMON.EXE 4212 CTFMON.EXE 2896 SPOOLSV.EXE 2896 SPOOLSV.EXE 4212 CTFMON.EXE 4212 CTFMON.EXE 2896 SPOOLSV.EXE 2896 SPOOLSV.EXE 4212 CTFMON.EXE 4212 CTFMON.EXE 2896 SPOOLSV.EXE 2896 SPOOLSV.EXE -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 4512 SVCHOST.EXE 4216 SVCHOST.EXE 2896 SPOOLSV.EXE 2840 SVCHOST.EXE 1928 SPOOLSV.EXE 4212 CTFMON.EXE 204 SVCHOST.EXE 3692 SPOOLSV.EXE 1444 CTFMON.EXE 3080 CTFMON.EXE 936 SPOOLSV.EXE 4892 CTFMON.EXE 4448 WINWORD.EXE 4448 WINWORD.EXE 4448 WINWORD.EXE 4448 WINWORD.EXE 4448 WINWORD.EXE 4448 WINWORD.EXE 4448 WINWORD.EXE -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2864 wrote to memory of 4512 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 84 PID 2864 wrote to memory of 4512 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 84 PID 2864 wrote to memory of 4512 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 84 PID 4512 wrote to memory of 4216 4512 SVCHOST.EXE 85 PID 4512 wrote to memory of 4216 4512 SVCHOST.EXE 85 PID 4512 wrote to memory of 4216 4512 SVCHOST.EXE 85 PID 4512 wrote to memory of 2896 4512 SVCHOST.EXE 86 PID 4512 wrote to memory of 2896 4512 SVCHOST.EXE 86 PID 4512 wrote to memory of 2896 4512 SVCHOST.EXE 86 PID 2896 wrote to memory of 2840 2896 SPOOLSV.EXE 87 PID 2896 wrote to memory of 2840 2896 SPOOLSV.EXE 87 PID 2896 wrote to memory of 2840 2896 SPOOLSV.EXE 87 PID 2896 wrote to memory of 1928 2896 SPOOLSV.EXE 88 PID 2896 wrote to memory of 1928 2896 SPOOLSV.EXE 88 PID 2896 wrote to memory of 1928 2896 SPOOLSV.EXE 88 PID 2896 wrote to memory of 4212 2896 SPOOLSV.EXE 89 PID 2896 wrote to memory of 4212 2896 SPOOLSV.EXE 89 PID 2896 wrote to memory of 4212 2896 SPOOLSV.EXE 89 PID 4212 wrote to memory of 204 4212 CTFMON.EXE 90 PID 4212 wrote to memory of 204 4212 CTFMON.EXE 90 PID 4212 wrote to memory of 204 4212 CTFMON.EXE 90 PID 4212 wrote to memory of 3692 4212 CTFMON.EXE 91 PID 4212 wrote to memory of 3692 4212 CTFMON.EXE 91 PID 4212 wrote to memory of 3692 4212 CTFMON.EXE 91 PID 4212 wrote to memory of 1444 4212 CTFMON.EXE 92 PID 4212 wrote to memory of 1444 4212 CTFMON.EXE 92 PID 4212 wrote to memory of 1444 4212 CTFMON.EXE 92 PID 4512 wrote to memory of 3080 4512 SVCHOST.EXE 93 PID 4512 wrote to memory of 3080 4512 SVCHOST.EXE 93 PID 4512 wrote to memory of 3080 4512 SVCHOST.EXE 93 PID 2864 wrote to memory of 936 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 94 PID 2864 wrote to memory of 936 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 94 PID 2864 wrote to memory of 936 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 94 PID 2864 wrote to memory of 4892 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 95 PID 2864 wrote to memory of 4892 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 95 PID 2864 wrote to memory of 4892 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 95 PID 2864 wrote to memory of 4448 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 99 PID 2864 wrote to memory of 4448 2864 7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe"C:\Users\Admin\AppData\Local\Temp\7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4216
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2840
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1928
-
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent4⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:204
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3692
-
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1444
-
-
-
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3080
-
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:936
-
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4892
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7909d52b9e1870b13daa6435015b52c8a87f9c646c67d0dd9efbdf1e34dda90f.doc" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4448
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD55962e262161173918965a4d0db5c65ac
SHA13613de872d6085d1f86aeb7b958b31b4bb859c8f
SHA2568d0bd2648ee42f19f518585735e62985f8a6f7265e3d86ca40185fde6c5c30ee
SHA51292217673a3090d9311ab647b6663b64008f39277d4528eb7e76385821e6e6483952c81a28fa8baf47f12bba7fb3571cf3502e9e144260c42ab2e5e858e8bc628
-
Filesize
42KB
MD55962e262161173918965a4d0db5c65ac
SHA13613de872d6085d1f86aeb7b958b31b4bb859c8f
SHA2568d0bd2648ee42f19f518585735e62985f8a6f7265e3d86ca40185fde6c5c30ee
SHA51292217673a3090d9311ab647b6663b64008f39277d4528eb7e76385821e6e6483952c81a28fa8baf47f12bba7fb3571cf3502e9e144260c42ab2e5e858e8bc628
-
Filesize
42KB
MD55962e262161173918965a4d0db5c65ac
SHA13613de872d6085d1f86aeb7b958b31b4bb859c8f
SHA2568d0bd2648ee42f19f518585735e62985f8a6f7265e3d86ca40185fde6c5c30ee
SHA51292217673a3090d9311ab647b6663b64008f39277d4528eb7e76385821e6e6483952c81a28fa8baf47f12bba7fb3571cf3502e9e144260c42ab2e5e858e8bc628
-
Filesize
42KB
MD55962e262161173918965a4d0db5c65ac
SHA13613de872d6085d1f86aeb7b958b31b4bb859c8f
SHA2568d0bd2648ee42f19f518585735e62985f8a6f7265e3d86ca40185fde6c5c30ee
SHA51292217673a3090d9311ab647b6663b64008f39277d4528eb7e76385821e6e6483952c81a28fa8baf47f12bba7fb3571cf3502e9e144260c42ab2e5e858e8bc628
-
Filesize
42KB
MD50c717c76cd2b88f2647d0553e1417ad9
SHA1b0803966169600f8c5d1314e833e7904fa0091c4
SHA2565d9b701f03ecd155ead220a6879e5b564b10b33844d332e92c59cad1950466f0
SHA5124dec5a0f53be75d9f0a16471840c075560ea1161c3938b86d42a0403d55390cda2eff11a9dde490bce78e9bafa7eb8c05a927d2940ef660bb01256e975efb77c
-
Filesize
42KB
MD50c717c76cd2b88f2647d0553e1417ad9
SHA1b0803966169600f8c5d1314e833e7904fa0091c4
SHA2565d9b701f03ecd155ead220a6879e5b564b10b33844d332e92c59cad1950466f0
SHA5124dec5a0f53be75d9f0a16471840c075560ea1161c3938b86d42a0403d55390cda2eff11a9dde490bce78e9bafa7eb8c05a927d2940ef660bb01256e975efb77c
-
Filesize
42KB
MD50c717c76cd2b88f2647d0553e1417ad9
SHA1b0803966169600f8c5d1314e833e7904fa0091c4
SHA2565d9b701f03ecd155ead220a6879e5b564b10b33844d332e92c59cad1950466f0
SHA5124dec5a0f53be75d9f0a16471840c075560ea1161c3938b86d42a0403d55390cda2eff11a9dde490bce78e9bafa7eb8c05a927d2940ef660bb01256e975efb77c
-
Filesize
42KB
MD50c717c76cd2b88f2647d0553e1417ad9
SHA1b0803966169600f8c5d1314e833e7904fa0091c4
SHA2565d9b701f03ecd155ead220a6879e5b564b10b33844d332e92c59cad1950466f0
SHA5124dec5a0f53be75d9f0a16471840c075560ea1161c3938b86d42a0403d55390cda2eff11a9dde490bce78e9bafa7eb8c05a927d2940ef660bb01256e975efb77c
-
Filesize
42KB
MD530329e71cb77b653fb97f2c49cf066bf
SHA136e71441147ecd3e520b6a7fe5da3ff66dde428e
SHA2569f6fb13e5ced63b7b3be2d718153c66ae18d3b7c5844dde6201f110e37c36d78
SHA5121caf3cc2c0e6da029430bed24848faafacfdef4fcda95cb105c22ad23402f8302a52911020cf64744e28e8d16e722a354761753cd60ae1849b5f8f172125cef0
-
Filesize
42KB
MD530329e71cb77b653fb97f2c49cf066bf
SHA136e71441147ecd3e520b6a7fe5da3ff66dde428e
SHA2569f6fb13e5ced63b7b3be2d718153c66ae18d3b7c5844dde6201f110e37c36d78
SHA5121caf3cc2c0e6da029430bed24848faafacfdef4fcda95cb105c22ad23402f8302a52911020cf64744e28e8d16e722a354761753cd60ae1849b5f8f172125cef0
-
Filesize
42KB
MD530329e71cb77b653fb97f2c49cf066bf
SHA136e71441147ecd3e520b6a7fe5da3ff66dde428e
SHA2569f6fb13e5ced63b7b3be2d718153c66ae18d3b7c5844dde6201f110e37c36d78
SHA5121caf3cc2c0e6da029430bed24848faafacfdef4fcda95cb105c22ad23402f8302a52911020cf64744e28e8d16e722a354761753cd60ae1849b5f8f172125cef0
-
Filesize
42KB
MD530329e71cb77b653fb97f2c49cf066bf
SHA136e71441147ecd3e520b6a7fe5da3ff66dde428e
SHA2569f6fb13e5ced63b7b3be2d718153c66ae18d3b7c5844dde6201f110e37c36d78
SHA5121caf3cc2c0e6da029430bed24848faafacfdef4fcda95cb105c22ad23402f8302a52911020cf64744e28e8d16e722a354761753cd60ae1849b5f8f172125cef0
-
Filesize
2KB
MD51a1dce35d60d2c70ca8894954fd5d384
SHA158547dd65d506c892290755010d0232da34ee000
SHA2562661c05273f33efa4b7faa6ed8a6f7e69a13ad86077f69ee285ece9cba57e44c
SHA5124abe37613145fabeb44ea4c28ecc827c8a0eb2b003e86ae7aef9be5687711fa7a294f17567ea0a70a6f14ab3cbe7886c83763a7c49278097fd53f0d11fd8154e
-
Filesize
2KB
MD51a1dce35d60d2c70ca8894954fd5d384
SHA158547dd65d506c892290755010d0232da34ee000
SHA2562661c05273f33efa4b7faa6ed8a6f7e69a13ad86077f69ee285ece9cba57e44c
SHA5124abe37613145fabeb44ea4c28ecc827c8a0eb2b003e86ae7aef9be5687711fa7a294f17567ea0a70a6f14ab3cbe7886c83763a7c49278097fd53f0d11fd8154e
-
Filesize
2KB
MD51a1dce35d60d2c70ca8894954fd5d384
SHA158547dd65d506c892290755010d0232da34ee000
SHA2562661c05273f33efa4b7faa6ed8a6f7e69a13ad86077f69ee285ece9cba57e44c
SHA5124abe37613145fabeb44ea4c28ecc827c8a0eb2b003e86ae7aef9be5687711fa7a294f17567ea0a70a6f14ab3cbe7886c83763a7c49278097fd53f0d11fd8154e
-
Filesize
42KB
MD55cec1e5bf1cbccc6e443ecc9aa7ac984
SHA164a0ac3cd8d78578d74d67c09d96e34b1e052619
SHA256a8cfd8f60b1025f4bdb53df5aa316a295608a12599b71d4537051121a2569fa1
SHA512f252b889905aeaaa2da043eda10554912b25df3ca1d44fe104d7ff390ae342a875c1c6cc15a1c43dd4fbb88f70f38a2d042226e4a106306658484e1788badfda
-
Filesize
42KB
MD579dec76c914d0d32999d8ff5f92ed12e
SHA160eb964b87b91eacb7989912370c41b11a0a4fec
SHA256f2d1723698ae9ac67b9a874cef72c73809376583e2cbb1036f07e42bd4a7d888
SHA512a403d79ff71f06946bba7b60f6d22be8d8200854778714198f8d5e0c9bd2af5894332f056e3863c6bd109d78966839755fae0dbe5cd488bfe37a01fc735abcf5
-
Filesize
42KB
MD5debaffeb2a78b752b8e1ea6e5005cee5
SHA16ef96cc76bf635321a1041bd00de3fc2ce94b734
SHA2564f53cc5d9b338bbd4e9d741c7e765e61925a95bc28a78d1beafd72a68c5aa457
SHA512f452a193f73f912db135210fe096416b7407ac0604b3ba02c440e4a1bd6621fee056567b0dcb01da8904f56d7bde74c6cb0b1b6dcd737e59a827b2313877d195
-
Filesize
42KB
MD55962e262161173918965a4d0db5c65ac
SHA13613de872d6085d1f86aeb7b958b31b4bb859c8f
SHA2568d0bd2648ee42f19f518585735e62985f8a6f7265e3d86ca40185fde6c5c30ee
SHA51292217673a3090d9311ab647b6663b64008f39277d4528eb7e76385821e6e6483952c81a28fa8baf47f12bba7fb3571cf3502e9e144260c42ab2e5e858e8bc628
-
Filesize
42KB
MD50c717c76cd2b88f2647d0553e1417ad9
SHA1b0803966169600f8c5d1314e833e7904fa0091c4
SHA2565d9b701f03ecd155ead220a6879e5b564b10b33844d332e92c59cad1950466f0
SHA5124dec5a0f53be75d9f0a16471840c075560ea1161c3938b86d42a0403d55390cda2eff11a9dde490bce78e9bafa7eb8c05a927d2940ef660bb01256e975efb77c
-
Filesize
42KB
MD530329e71cb77b653fb97f2c49cf066bf
SHA136e71441147ecd3e520b6a7fe5da3ff66dde428e
SHA2569f6fb13e5ced63b7b3be2d718153c66ae18d3b7c5844dde6201f110e37c36d78
SHA5121caf3cc2c0e6da029430bed24848faafacfdef4fcda95cb105c22ad23402f8302a52911020cf64744e28e8d16e722a354761753cd60ae1849b5f8f172125cef0