Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 10:33
Static task
static1
Behavioral task
behavioral1
Sample
dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe
Resource
win10v2004-20220901-en
General
-
Target
dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe
-
Size
3.0MB
-
MD5
a3acbd698ff32feb9a738fd573d042f5
-
SHA1
c53627a065620b31fe91796b0293a46967787b48
-
SHA256
dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7
-
SHA512
d61378234d3b1c75d49f7c3adad7127ee8e36661608500ad458708929eff6924f545e9bdc1d0ef6c3737ae72fca960630aeb309e7bad3e5dac2949db6323379f
-
SSDEEP
98304:7NQPOuvJmG889PIGgMh8m8XQYXAWveg+ldUmOD:+PA8WGlhbuPvC9G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe -
Loads dropped DLL 2 IoCs
pid Process 856 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 892 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\TypeLib\ = "{1DA45E61-82DE-4F28-850C-9DC89A5CF427}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1DA45E61-82DE-4F28-850C-9DC89A5CF427} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\ = "_DFramerCtlEvents" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\DataFormats regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DMOffice.FramerControl\ = "DMOffice Control" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1DA45E61-82DE-4F28-850C-9DC89A5CF427}\4.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\temp\\WebSaver\\1666269228" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\ = "_FramerControl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\TypeLib\ = "{1DA45E61-82DE-4F28-850C-9DC89A5CF427}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\DataFormats\GetSet\0\ = "3,1,32,1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DMOffice.FramerControl regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DMOffice.FramerControl\CLSID\ = "{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\ = "_DFramerCtlEvents" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1DA45E61-82DE-4F28-850C-9DC89A5CF427}\4.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1DA45E61-82DE-4F28-850C-9DC89A5CF427}\4.0\FLAGS\ = "2" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\ToolboxBitmap32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\TypeLib\ = "{1DA45E61-82DE-4F28-850C-9DC89A5CF427}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\temp\\WebSaver\\1666269228\\dmoffice.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\DataFormats\GetSet\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1DA45E61-82DE-4F28-850C-9DC89A5CF427}\4.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\TypeLib\ = "{1DA45E61-82DE-4F28-850C-9DC89A5CF427}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\Control regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\Version\ = "4.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\MiscStatus regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\MiscStatus\ = "131473" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\TypeLib\Version = "4.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\ProgID\ = "DMOffice.FramerControl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\TypeLib\Version = "4.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\ = "_FramerControl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1DA45E61-82DE-4F28-850C-9DC89A5CF427}\4.0\ = "DMOffice Control" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\TypeLib\Version = "4.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1DA45E61-82DE-4F28-850C-9DC89A5CF427}\4.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1DA45E61-82DE-4F28-850C-9DC89A5CF427}\4.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\temp\\WebSaver\\1666269228\\dmoffice.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\TypeLib\Version = "4.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DMOffice.FramerControl\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1DA45E61-82DE-4F28-850C-9DC89A5CF427}\4.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\ = "DMOffice Control Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\ToolboxBitmap32\ = "C:\\Users\\Admin\\AppData\\Local\\temp\\WebSaver\\1666269228\\dmoffice.dll,102" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\TypeLib\ = "{1DA45E61-82DE-4f28-850C-9DC89A5CF427}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\DataFormats\GetSet regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1DA45E61-82DE-4F28-850C-9DC89A5CF427}\4.0\HELPDIR regsvr32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe -
Suspicious use of FindShellTrayWindow 56 IoCs
pid Process 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe -
Suspicious use of SendNotifyMessage 56 IoCs
pid Process 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 856 wrote to memory of 2008 856 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 26 PID 856 wrote to memory of 2008 856 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 26 PID 856 wrote to memory of 2008 856 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 26 PID 856 wrote to memory of 2008 856 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 26 PID 2008 wrote to memory of 892 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 27 PID 2008 wrote to memory of 892 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 27 PID 2008 wrote to memory of 892 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 27 PID 2008 wrote to memory of 892 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 27 PID 2008 wrote to memory of 892 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 27 PID 2008 wrote to memory of 892 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 27 PID 2008 wrote to memory of 892 2008 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe"C:\Users\Admin\AppData\Local\Temp\dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\temp\WebSaver\1666269228\dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exeC:\Users\Admin\AppData\Local\temp\\WebSaver\1666269228\\dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe "C:\Users\Admin\AppData\Local\Temp\dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe" 2040832 2521048282⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" "C:\Users\Admin\AppData\Local\temp\WebSaver\1666269228\dmoffice.dll"3⤵
- Loads dropped DLL
- Modifies registry class
PID:892
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\WebSaver\1666269228\dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe
Filesize1.9MB
MD546476a54546d3187a212799b7adc4fc0
SHA1252df7c036f3ec1922d253a5d6e8eb548e678db0
SHA256a261b0e3eb976e5209f30ccf0be41bc9b708c184fd260dff4f7cc80ea601e71c
SHA512ec1ea746e7d105db861cd0a39047e34c9ca588570939224371b4458cd5230b1445a2b0cc9ddf0d6f54196003ae47d1e8d35a3518c4fdd7dc98cb6fe1f1808905
-
C:\Users\Admin\AppData\Local\temp\WebSaver\1666269228\dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe
Filesize1.9MB
MD546476a54546d3187a212799b7adc4fc0
SHA1252df7c036f3ec1922d253a5d6e8eb548e678db0
SHA256a261b0e3eb976e5209f30ccf0be41bc9b708c184fd260dff4f7cc80ea601e71c
SHA512ec1ea746e7d105db861cd0a39047e34c9ca588570939224371b4458cd5230b1445a2b0cc9ddf0d6f54196003ae47d1e8d35a3518c4fdd7dc98cb6fe1f1808905
-
Filesize
115KB
MD534629672023f707eb7117c981e9c5d1d
SHA1d9b8e3e7459d105c86fd9ca55461e121bc028d9f
SHA256abfde2d27485e1e70b598711aaa24e3ae70e4782f991914d6a175ff3bbf0867d
SHA5121c9ca8ac4bba76542ce5bb469b99d596cc2577b005aa3077aec31a6a441313d7f7720c856da5d4d1f0988fa56b1c8a27b52e8063a542aa897fd56eb084047877
-
\Users\Admin\AppData\Local\Temp\WebSaver\1666269228\dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe
Filesize1.9MB
MD546476a54546d3187a212799b7adc4fc0
SHA1252df7c036f3ec1922d253a5d6e8eb548e678db0
SHA256a261b0e3eb976e5209f30ccf0be41bc9b708c184fd260dff4f7cc80ea601e71c
SHA512ec1ea746e7d105db861cd0a39047e34c9ca588570939224371b4458cd5230b1445a2b0cc9ddf0d6f54196003ae47d1e8d35a3518c4fdd7dc98cb6fe1f1808905
-
Filesize
115KB
MD534629672023f707eb7117c981e9c5d1d
SHA1d9b8e3e7459d105c86fd9ca55461e121bc028d9f
SHA256abfde2d27485e1e70b598711aaa24e3ae70e4782f991914d6a175ff3bbf0867d
SHA5121c9ca8ac4bba76542ce5bb469b99d596cc2577b005aa3077aec31a6a441313d7f7720c856da5d4d1f0988fa56b1c8a27b52e8063a542aa897fd56eb084047877