Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 14:13
Static task
static1
Behavioral task
behavioral1
Sample
13ceea385cc648fde9ccfeecf41de0602e081829351549f86c118dff19eb129f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
13ceea385cc648fde9ccfeecf41de0602e081829351549f86c118dff19eb129f.exe
Resource
win10v2004-20220812-en
General
-
Target
13ceea385cc648fde9ccfeecf41de0602e081829351549f86c118dff19eb129f.exe
-
Size
20KB
-
MD5
a1d6e5ed3a1348211aaadf09ce0b4730
-
SHA1
8a638ebc991ff6790388fb9c3398b0cd95402b32
-
SHA256
13ceea385cc648fde9ccfeecf41de0602e081829351549f86c118dff19eb129f
-
SHA512
4df17a6490d2c45c72778f81a6ab76fbe3de46fa25f4f3c27a8d168cfd59dc79578fa619416e71d825f6c52a3b549149cd1dd3fcc13ffd54e53d043597898a67
-
SSDEEP
192:1l5E3krTuntKy0peHDfCpHfBv+I4QwXt9V+jqu0G5KDJB1vRnD:1M3PnQoHDCpHf4I4Qwdc0G5KDJf5
Malware Config
Signatures
-
Drops file in Drivers directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe 13ceea385cc648fde9ccfeecf41de0602e081829351549f86c118dff19eb129f.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\drivers\Msvbvm60.dll winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\Msvbvm60.dll winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe -
Executes dropped EXE 4 IoCs
pid Process 1664 winlogon.exe 776 AE 0124 BE.exe 580 winlogon.exe 1688 winlogon.exe -
Loads dropped DLL 8 IoCs
pid Process 1376 13ceea385cc648fde9ccfeecf41de0602e081829351549f86c118dff19eb129f.exe 1376 13ceea385cc648fde9ccfeecf41de0602e081829351549f86c118dff19eb129f.exe 1664 winlogon.exe 1664 winlogon.exe 776 AE 0124 BE.exe 776 AE 0124 BE.exe 580 winlogon.exe 1688 winlogon.exe -
Drops desktop.ini file(s) 13 IoCs
description ioc Process File opened for modification C:\Windows\Downloaded Program Files\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Globalization\MCT\MCT-GB\Link\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Globalization\MCT\MCT-US\Wallpaper\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Media\Afternoon\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Globalization\MCT\MCT-ZA\Wallpaper\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Media\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\assembly\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Fonts\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Globalization\MCT\MCT-AU\Wallpaper\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Globalization\MCT\MCT-CA\Wallpaper\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Globalization\MCT\MCT-GB\Wallpaper\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Globalization\MCT\MCT-US\Link\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Media\Calligraphy\Desktop.ini AE 0124 BE.exe -
Drops autorun.inf file 1 TTPs 27 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification \??\K:\Autorun.inf winlogon.exe File opened for modification \??\L:\Autorun.inf winlogon.exe File opened for modification \??\P:\Autorun.inf winlogon.exe File opened for modification \??\U:\Autorun.inf winlogon.exe File opened for modification C:\Windows\BitLockerDiscoveryVolumeContents\autorun.inf AE 0124 BE.exe File opened for modification D:\Autorun.inf winlogon.exe File opened for modification \??\F:\Autorun.inf winlogon.exe File opened for modification \??\J:\Autorun.inf winlogon.exe File opened for modification \??\M:\Autorun.inf winlogon.exe File opened for modification \??\R:\Autorun.inf winlogon.exe File opened for modification \??\B:\Autorun.inf winlogon.exe File opened for modification \??\G:\Autorun.inf winlogon.exe File opened for modification \??\T:\Autorun.inf winlogon.exe File opened for modification \??\A:\Autorun.inf winlogon.exe File opened for modification \??\E:\Autorun.inf winlogon.exe File opened for modification \??\O:\Autorun.inf winlogon.exe File opened for modification \??\S:\Autorun.inf winlogon.exe File opened for modification \??\X:\Autorun.inf winlogon.exe File opened for modification \??\I:\Autorun.inf winlogon.exe File opened for modification C:\Autorun.inf winlogon.exe File opened for modification \??\H:\Autorun.inf winlogon.exe File opened for modification \??\N:\Autorun.inf winlogon.exe File opened for modification \??\V:\Autorun.inf winlogon.exe File opened for modification \??\Z:\Autorun.inf winlogon.exe File opened for modification \??\Q:\Autorun.inf winlogon.exe File opened for modification \??\Y:\Autorun.inf winlogon.exe File opened for modification \??\W:\Autorun.inf winlogon.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\regedit.exe AE 0124 BE.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Design AE 0124 BE.exe File opened for modification C:\Windows\Fonts\ega40866.fon AE 0124 BE.exe File opened for modification C:\Windows\Help\Windows\en-US\artuimedia.h1s AE 0124 BE.exe File opened for modification C:\Windows\inf\RemoteAccess\0411 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.ServiceModel.Web.resources\3.5.0.0_de_31bf3856ad364e35\System.ServiceModel.Web.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Ente96d83b35#\6682e8964200a1336f1dbe49392f7797\System.EnterpriseServices.Wrapper.dll AE 0124 BE.exe File opened for modification C:\Windows\Fonts\app852.fon AE 0124 BE.exe File opened for modification C:\Windows\Fonts\simpo.ttf AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0\9.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.GroupPoli# AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\Device\DB_DeviceErrorLibrary.ps1 AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\PCW\es-ES\DiagPackage.dll.mui AE 0124 BE.exe File opened for modification C:\Windows\ehome\CreateDisc\Styles AE 0124 BE.exe File opened for modification C:\Windows\ehome\es-ES\ehchhime.dll.mui AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Policy.11.0.Microsoft.Office.Interop.PowerPoint\14.0.0.0__71e9bce111e9429c\Policy.11.0.Microsoft.Office.Interop.PowerPoint.config AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Web.Entity.Design.resources\3.5.0.0_it_b77a5c561934e089\System.Web.Entity.Design.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\Cursors\wait_im.cur AE 0124 BE.exe File opened for modification C:\Windows\Installer\37de7.msi AE 0124 BE.exe File opened for modification C:\Windows\Installer\{90140000-0011-0000-0000-0000000FF1CE}\msouc.exe AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Build.Con#\942c10614a6f8c8a22d1f74e217a11d6\Microsoft.Build.Conversion.v3.5.ni.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.MediaCent#\1f517ecba89b0f399021bdbc8fb3db82 AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\AERO\TS_Transparency.ps1 AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\Audio\TS_DisabledInCPL.ps1 AE 0124 BE.exe File opened for modification C:\Windows\Help\mui\0410\aclui.CHM AE 0124 BE.exe File opened for modification C:\Windows\inf\PERFLIB\0411\perfh.dat AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Web.Services AE 0124 BE.exe File opened for modification C:\Windows\Help\mui\0407\diskmgt.CHM AE 0124 BE.exe File opened for modification C:\Windows\inf\mdmtron.PNF AE 0124 BE.exe File opened for modification C:\Windows\Fonts\gautamib.ttf AE 0124 BE.exe File opened for modification C:\Windows\Help\Windows\ja-JP\auxdisp.h1s AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\6.1.0.0__31bf3856ad364e35\Microsoft.GroupPolicy.AdmTmplEditor.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Office.Interop.Outlook AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Office.Interop.Access\14.0.0.0__71e9bce111e9429c\Microsoft.Office.Interop.Access.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\MMCEx.Resources\3.0.0.0_en_31bf3856ad364e35\MMCEx.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Build.Eng#\8c4abd55a6b822e3efbbc649c5c01a3e\Microsoft.Build.Engine.ni.dll AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\Performance\TS_PIOMode.ps1 AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\PresentationCFFRast# AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Serv43e0ae6e#\155f8a911bfaadd919c85d61838cdd1e\System.ServiceModel.Routing.ni.dll.aux AE 0124 BE.exe File opened for modification C:\Windows\ehome\MediaRenderer\MediaCenter.DigitalMediaRenderer.ConnectionManager.xml AE 0124 BE.exe File opened for modification C:\Windows\inf\MSDTC Bridge 4.0.0.0\000A AE 0124 BE.exe File opened for modification C:\Windows\inf\Windows Workflow Foundation 3.0.0.0\0000 AE 0124 BE.exe File opened for modification C:\Windows\inf\lsi_sas2.PNF AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Web.Entity AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Web.Services.resources\2.0.0.0_ja_b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Net AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\System.DirectorySer#\45ec12795950a7d54691591c615a9e3c\System.DirectoryServices.ni.dll AE 0124 BE.exe File opened for modification C:\Windows\Cursors\aero_pen_l.cur AE 0124 BE.exe File opened for modification C:\Windows\Help\Windows\de-DE\deskpr.h1s AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Deployment\2.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Runtime.Remoting.resources\2.0.0.0_it_b77a5c561934e089 AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.Te49ad7d9#\c73da2d72e0bbeaf6538615dba2d7143\Microsoft.Transactions.Bridge.ni.dll.aux AE 0124 BE.exe File opened for modification C:\Windows\ehome\ehskb.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC\Microsoft.mshtml\7.0.3300.0__b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.MediaCenter.UI\6.1.0.0__31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Office.Interop.OneNote\12.0.0.0__71e9bce111e9429c AE 0124 BE.exe File opened for modification C:\Windows\ehome\luttx43.ttf AE 0124 BE.exe File opened for modification C:\Windows\inf\wiahp001.PNF AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.WSMan.Management.Resources\1.0.0.0_ja_31bf3856ad364e35\Microsoft.WSMan.Management.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\ehome\wow\it-IT\ehdebug.dll.mui AE 0124 BE.exe File opened for modification C:\Windows\inf\netnvm64.PNF AE 0124 BE.exe File opened for modification C:\Windows\inf\MSDTC\0000\msdtcprf.ini AE 0124 BE.exe File opened for modification C:\Windows\inf\PERFLIB\0407 AE 0124 BE.exe File opened for modification C:\Windows\inf\wsearchidxpi\0C0A\idxcntrs.ini AE 0124 BE.exe File opened for modification C:\Windows\AppPatch\en-US AE 0124 BE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "372965006" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a300000000020000000000106600000001000020000000607571185a69ad5ebea9f2930f88d68c31fe777d48d4b0f80fa1fdb4f68b42fe000000000e80000000020000200000003df2c70e2957dd19fc4432d93af43c47b2a6376044ad9458ae0d7c0af7457b08900000009f0c2d1c2b937a22f5fba65487cdf71a697037b0bc5dcc5cd21c96e33c94b4bec97e1b893c3a7a158cd14ff4d368ce9232aee5ae626f0c83a46e98c2604d2122f281959c776f362d13f89ba6891f8225c42afed1029a5acf94709b6490d20a4154076c4fd49058dcf73e482e16597db293522c33cc86539adce3248a90a85bae0c1f829e82666322ece41026fdce2d1b400000001bd8f0167f8bbb1bd888784574a7c597294d02e332b8257f66a043c5204553535ad0ebcf0b75471d5cd97bdff5029d5e86a413ba6354ec1db0e8f49abb7afe75 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a300000000020000000000106600000001000020000000c45e016cc01b0a889c63176be483287e5903b30feb87b9280fb29e68332519ee000000000e8000000002000020000000222ffb814fe3983c11fb985a5e0d1d70410b5b38cd86f6159bd8da3c669a4de920000000d12b4440422592315e9a5ddfa1dbaac0b7ddb2ce161a9fdc48b7f43283fd1a9040000000d7cccefc5c9dc884632415ed6b76518a816f5b9d835275e151252019d4afca63c85ffb2b2f266ba33af5008aa590d81dcc30bb1e932edb05f18860ef8d28a820 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{442CE9D1-4FD2-11ED-8AB9-FAB5137186BE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103d561edfe3d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 892 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1376 13ceea385cc648fde9ccfeecf41de0602e081829351549f86c118dff19eb129f.exe 892 iexplore.exe 892 iexplore.exe 1664 winlogon.exe 776 AE 0124 BE.exe 1688 winlogon.exe 580 winlogon.exe 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1376 wrote to memory of 892 1376 13ceea385cc648fde9ccfeecf41de0602e081829351549f86c118dff19eb129f.exe 28 PID 1376 wrote to memory of 892 1376 13ceea385cc648fde9ccfeecf41de0602e081829351549f86c118dff19eb129f.exe 28 PID 1376 wrote to memory of 892 1376 13ceea385cc648fde9ccfeecf41de0602e081829351549f86c118dff19eb129f.exe 28 PID 1376 wrote to memory of 892 1376 13ceea385cc648fde9ccfeecf41de0602e081829351549f86c118dff19eb129f.exe 28 PID 892 wrote to memory of 1828 892 iexplore.exe 30 PID 892 wrote to memory of 1828 892 iexplore.exe 30 PID 892 wrote to memory of 1828 892 iexplore.exe 30 PID 892 wrote to memory of 1828 892 iexplore.exe 30 PID 1376 wrote to memory of 1664 1376 13ceea385cc648fde9ccfeecf41de0602e081829351549f86c118dff19eb129f.exe 31 PID 1376 wrote to memory of 1664 1376 13ceea385cc648fde9ccfeecf41de0602e081829351549f86c118dff19eb129f.exe 31 PID 1376 wrote to memory of 1664 1376 13ceea385cc648fde9ccfeecf41de0602e081829351549f86c118dff19eb129f.exe 31 PID 1376 wrote to memory of 1664 1376 13ceea385cc648fde9ccfeecf41de0602e081829351549f86c118dff19eb129f.exe 31 PID 1664 wrote to memory of 776 1664 winlogon.exe 32 PID 1664 wrote to memory of 776 1664 winlogon.exe 32 PID 1664 wrote to memory of 776 1664 winlogon.exe 32 PID 1664 wrote to memory of 776 1664 winlogon.exe 32 PID 1664 wrote to memory of 580 1664 winlogon.exe 33 PID 1664 wrote to memory of 580 1664 winlogon.exe 33 PID 1664 wrote to memory of 580 1664 winlogon.exe 33 PID 1664 wrote to memory of 580 1664 winlogon.exe 33 PID 776 wrote to memory of 1688 776 AE 0124 BE.exe 34 PID 776 wrote to memory of 1688 776 AE 0124 BE.exe 34 PID 776 wrote to memory of 1688 776 AE 0124 BE.exe 34 PID 776 wrote to memory of 1688 776 AE 0124 BE.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\13ceea385cc648fde9ccfeecf41de0602e081829351549f86c118dff19eb129f.exe"C:\Users\Admin\AppData\Local\Temp\13ceea385cc648fde9ccfeecf41de0602e081829351549f86c118dff19eb129f.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Windows\AE 0124 BE.gif2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:892 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1828
-
-
-
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops autorun.inf file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\AE 0124 BE.exe"C:\Windows\AE 0124 BE.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops desktop.ini file(s)
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1688
-
-
-
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:580
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
603B
MD5adda75288422e2f605fb4f1e726a84eb
SHA1434a297e49084ea2093a2fb6d2acc9803ae5e7e0
SHA2567e31b8977c1d9eb3ad9ca9f0cb951351b73e1d8b7144471a01de2f997e559794
SHA5121dbaa01b8ea2060b829981597fa2f5258cfdee2869b648d7fb42ac348d6edd18a3e0a24ac15d1b4325d4c57eb72c3d8eda6707f37b79b715fd9b495c5e0d176e
-
Filesize
40KB
MD559b9aa37d99882851104ac28914baa86
SHA155f9de125e56d648a6d991b3c309ec43d92531d4
SHA25611e443cade5292bdde6d6c04d250e18ab2cd2168c3a76a49c8e8768c17ad1171
SHA5125cfc2130a6183e784dd3e9e6844104fc6ba37340c2735ffa87a0cf8eb6857c171e1c41dcd8a62651e5aa8c3ea8b49bffda302a8f61609a0dead861fc01c4c21a
-
Filesize
40KB
MD559b9aa37d99882851104ac28914baa86
SHA155f9de125e56d648a6d991b3c309ec43d92531d4
SHA25611e443cade5292bdde6d6c04d250e18ab2cd2168c3a76a49c8e8768c17ad1171
SHA5125cfc2130a6183e784dd3e9e6844104fc6ba37340c2735ffa87a0cf8eb6857c171e1c41dcd8a62651e5aa8c3ea8b49bffda302a8f61609a0dead861fc01c4c21a
-
Filesize
40KB
MD5f6fed97e1d5fe9b38b51e36ad038f154
SHA1d9a1b22e09769f437d36204af3c3776e544451b7
SHA2569d8c143b045a85597e89b969ce1e9e51ad8c4354c4901d2b2f698ebb6e1d0c57
SHA512e6c98023b2e727878e1651a3a495e50a361b13d51a2f103c7f43bd644022a23cee2c080aa95c55f5065ce3642d65d0f98cc0793360b48aef8f3a708bbead124b
-
Filesize
40KB
MD5f6fed97e1d5fe9b38b51e36ad038f154
SHA1d9a1b22e09769f437d36204af3c3776e544451b7
SHA2569d8c143b045a85597e89b969ce1e9e51ad8c4354c4901d2b2f698ebb6e1d0c57
SHA512e6c98023b2e727878e1651a3a495e50a361b13d51a2f103c7f43bd644022a23cee2c080aa95c55f5065ce3642d65d0f98cc0793360b48aef8f3a708bbead124b
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
40KB
MD559b9aa37d99882851104ac28914baa86
SHA155f9de125e56d648a6d991b3c309ec43d92531d4
SHA25611e443cade5292bdde6d6c04d250e18ab2cd2168c3a76a49c8e8768c17ad1171
SHA5125cfc2130a6183e784dd3e9e6844104fc6ba37340c2735ffa87a0cf8eb6857c171e1c41dcd8a62651e5aa8c3ea8b49bffda302a8f61609a0dead861fc01c4c21a
-
Filesize
40KB
MD559b9aa37d99882851104ac28914baa86
SHA155f9de125e56d648a6d991b3c309ec43d92531d4
SHA25611e443cade5292bdde6d6c04d250e18ab2cd2168c3a76a49c8e8768c17ad1171
SHA5125cfc2130a6183e784dd3e9e6844104fc6ba37340c2735ffa87a0cf8eb6857c171e1c41dcd8a62651e5aa8c3ea8b49bffda302a8f61609a0dead861fc01c4c21a
-
Filesize
40KB
MD559b9aa37d99882851104ac28914baa86
SHA155f9de125e56d648a6d991b3c309ec43d92531d4
SHA25611e443cade5292bdde6d6c04d250e18ab2cd2168c3a76a49c8e8768c17ad1171
SHA5125cfc2130a6183e784dd3e9e6844104fc6ba37340c2735ffa87a0cf8eb6857c171e1c41dcd8a62651e5aa8c3ea8b49bffda302a8f61609a0dead861fc01c4c21a
-
Filesize
40KB
MD559b9aa37d99882851104ac28914baa86
SHA155f9de125e56d648a6d991b3c309ec43d92531d4
SHA25611e443cade5292bdde6d6c04d250e18ab2cd2168c3a76a49c8e8768c17ad1171
SHA5125cfc2130a6183e784dd3e9e6844104fc6ba37340c2735ffa87a0cf8eb6857c171e1c41dcd8a62651e5aa8c3ea8b49bffda302a8f61609a0dead861fc01c4c21a
-
Filesize
25B
MD5589b6886a49054d03b739309a1de9fcc
SHA10ec1dff7a03f13dea28eea5e754d5b0e5e1dc308
SHA256564815feb9c5bdadb145cd0d16738c4e5fbc6a46cf65c62ac6a985c43d1939e8
SHA5124b6f567398863aba39eec00e9f071364b79d5c29867b93fb968725e10e33a9bfff60f8ab6acceae44e715a35ec7139d12da06c33fa074b6be02ff5357c53c0eb
-
Filesize
25B
MD5589b6886a49054d03b739309a1de9fcc
SHA10ec1dff7a03f13dea28eea5e754d5b0e5e1dc308
SHA256564815feb9c5bdadb145cd0d16738c4e5fbc6a46cf65c62ac6a985c43d1939e8
SHA5124b6f567398863aba39eec00e9f071364b79d5c29867b93fb968725e10e33a9bfff60f8ab6acceae44e715a35ec7139d12da06c33fa074b6be02ff5357c53c0eb
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
40KB
MD559b9aa37d99882851104ac28914baa86
SHA155f9de125e56d648a6d991b3c309ec43d92531d4
SHA25611e443cade5292bdde6d6c04d250e18ab2cd2168c3a76a49c8e8768c17ad1171
SHA5125cfc2130a6183e784dd3e9e6844104fc6ba37340c2735ffa87a0cf8eb6857c171e1c41dcd8a62651e5aa8c3ea8b49bffda302a8f61609a0dead861fc01c4c21a
-
Filesize
40KB
MD559b9aa37d99882851104ac28914baa86
SHA155f9de125e56d648a6d991b3c309ec43d92531d4
SHA25611e443cade5292bdde6d6c04d250e18ab2cd2168c3a76a49c8e8768c17ad1171
SHA5125cfc2130a6183e784dd3e9e6844104fc6ba37340c2735ffa87a0cf8eb6857c171e1c41dcd8a62651e5aa8c3ea8b49bffda302a8f61609a0dead861fc01c4c21a
-
Filesize
40KB
MD559b9aa37d99882851104ac28914baa86
SHA155f9de125e56d648a6d991b3c309ec43d92531d4
SHA25611e443cade5292bdde6d6c04d250e18ab2cd2168c3a76a49c8e8768c17ad1171
SHA5125cfc2130a6183e784dd3e9e6844104fc6ba37340c2735ffa87a0cf8eb6857c171e1c41dcd8a62651e5aa8c3ea8b49bffda302a8f61609a0dead861fc01c4c21a
-
Filesize
40KB
MD559b9aa37d99882851104ac28914baa86
SHA155f9de125e56d648a6d991b3c309ec43d92531d4
SHA25611e443cade5292bdde6d6c04d250e18ab2cd2168c3a76a49c8e8768c17ad1171
SHA5125cfc2130a6183e784dd3e9e6844104fc6ba37340c2735ffa87a0cf8eb6857c171e1c41dcd8a62651e5aa8c3ea8b49bffda302a8f61609a0dead861fc01c4c21a
-
Filesize
40KB
MD559b9aa37d99882851104ac28914baa86
SHA155f9de125e56d648a6d991b3c309ec43d92531d4
SHA25611e443cade5292bdde6d6c04d250e18ab2cd2168c3a76a49c8e8768c17ad1171
SHA5125cfc2130a6183e784dd3e9e6844104fc6ba37340c2735ffa87a0cf8eb6857c171e1c41dcd8a62651e5aa8c3ea8b49bffda302a8f61609a0dead861fc01c4c21a
-
Filesize
40KB
MD559b9aa37d99882851104ac28914baa86
SHA155f9de125e56d648a6d991b3c309ec43d92531d4
SHA25611e443cade5292bdde6d6c04d250e18ab2cd2168c3a76a49c8e8768c17ad1171
SHA5125cfc2130a6183e784dd3e9e6844104fc6ba37340c2735ffa87a0cf8eb6857c171e1c41dcd8a62651e5aa8c3ea8b49bffda302a8f61609a0dead861fc01c4c21a