Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
83s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 10:33
Static task
static1
Behavioral task
behavioral1
Sample
dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe
Resource
win10v2004-20220901-en
General
-
Target
dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe
-
Size
3.0MB
-
MD5
a3acbd698ff32feb9a738fd573d042f5
-
SHA1
c53627a065620b31fe91796b0293a46967787b48
-
SHA256
dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7
-
SHA512
d61378234d3b1c75d49f7c3adad7127ee8e36661608500ad458708929eff6924f545e9bdc1d0ef6c3737ae72fca960630aeb309e7bad3e5dac2949db6323379f
-
SSDEEP
98304:7NQPOuvJmG889PIGgMh8m8XQYXAWveg+ldUmOD:+PA8WGlhbuPvC9G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe -
Loads dropped DLL 1 IoCs
pid Process 2948 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\MiscStatus regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\TypeLib\ = "{1DA45E61-82DE-4F28-850C-9DC89A5CF427}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\DataFormats\GetSet\0\ = "3,1,32,1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DMOffice.FramerControl\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\temp\\WebSaver\\1666262021\\dmoffice.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\DataFormats\GetSet\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\Version\ = "4.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\DataFormats\GetSet regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DMOffice.FramerControl\CLSID\ = "{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\TypeLib\Version = "4.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\MiscStatus\ = "131473" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1DA45E61-82DE-4F28-850C-9DC89A5CF427}\4.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1DA45E61-82DE-4F28-850C-9DC89A5CF427}\4.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\temp\\WebSaver\\1666262021" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\ = "DMOffice Control Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1DA45E61-82DE-4F28-850C-9DC89A5CF427}\4.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1DA45E61-82DE-4F28-850C-9DC89A5CF427}\4.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\TypeLib\ = "{1DA45E61-82DE-4F28-850C-9DC89A5CF427}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DMOffice.FramerControl regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\ = "_FramerControl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\TypeLib\ = "{1DA45E61-82DE-4F28-850C-9DC89A5CF427}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\ = "_DFramerCtlEvents" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1DA45E61-82DE-4F28-850C-9DC89A5CF427} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1DA45E61-82DE-4F28-850C-9DC89A5CF427}\4.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\temp\\WebSaver\\1666262021\\dmoffice.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\TypeLib\Version = "4.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\TypeLib\ = "{1DA45E61-82DE-4F28-850C-9DC89A5CF427}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1DA45E61-82DE-4F28-850C-9DC89A5CF427}\4.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1DA45E61-82DE-4F28-850C-9DC89A5CF427}\4.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\TypeLib\Version = "4.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DMOffice.FramerControl\ = "DMOffice Control" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\Control regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\ToolboxBitmap32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\ToolboxBitmap32\ = "C:\\Users\\Admin\\AppData\\Local\\temp\\WebSaver\\1666262021\\dmoffice.dll,102" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\TypeLib\ = "{1DA45E61-82DE-4f28-850C-9DC89A5CF427}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\ = "_DFramerCtlEvents" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\TypeLib\Version = "4.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\DataFormats regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1DA45E61-82DE-4F28-850C-9DC89A5CF427}\4.0\ = "DMOffice Control" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C940ECDB-1898-4482-B77A-DB9F6E06F0C2}\ProgID\ = "DMOffice.FramerControl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1DA45E61-82DE-4F28-850C-9DC89A5CF427}\4.0\FLAGS\ = "2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E922E780-6D6E-4707-ACA8-728FAB4A7A39}\ = "_FramerControl" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48396D66-023A-4AD7-92B0-1BDE88D8FEB2}\ProxyStubClsid32 regsvr32.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1884 wrote to memory of 1476 1884 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 83 PID 1884 wrote to memory of 1476 1884 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 83 PID 1884 wrote to memory of 1476 1884 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 83 PID 1476 wrote to memory of 2948 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 84 PID 1476 wrote to memory of 2948 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 84 PID 1476 wrote to memory of 2948 1476 dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe"C:\Users\Admin\AppData\Local\Temp\dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\temp\WebSaver\1666262021\dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exeC:\Users\Admin\AppData\Local\temp\\WebSaver\1666262021\\dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe "C:\Users\Admin\AppData\Local\Temp\dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe" 2040832 2521048282⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" "C:\Users\Admin\AppData\Local\temp\WebSaver\1666262021\dmoffice.dll"3⤵
- Loads dropped DLL
- Modifies registry class
PID:2948
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\WebSaver\1666262021\dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe
Filesize1.9MB
MD546476a54546d3187a212799b7adc4fc0
SHA1252df7c036f3ec1922d253a5d6e8eb548e678db0
SHA256a261b0e3eb976e5209f30ccf0be41bc9b708c184fd260dff4f7cc80ea601e71c
SHA512ec1ea746e7d105db861cd0a39047e34c9ca588570939224371b4458cd5230b1445a2b0cc9ddf0d6f54196003ae47d1e8d35a3518c4fdd7dc98cb6fe1f1808905
-
Filesize
115KB
MD534629672023f707eb7117c981e9c5d1d
SHA1d9b8e3e7459d105c86fd9ca55461e121bc028d9f
SHA256abfde2d27485e1e70b598711aaa24e3ae70e4782f991914d6a175ff3bbf0867d
SHA5121c9ca8ac4bba76542ce5bb469b99d596cc2577b005aa3077aec31a6a441313d7f7720c856da5d4d1f0988fa56b1c8a27b52e8063a542aa897fd56eb084047877
-
C:\Users\Admin\AppData\Local\temp\WebSaver\1666262021\dfc442a06bd3c1aa6a5d1edfb6fbf2c1372f527c0f02628940a98668e045eac7.exe
Filesize1.9MB
MD546476a54546d3187a212799b7adc4fc0
SHA1252df7c036f3ec1922d253a5d6e8eb548e678db0
SHA256a261b0e3eb976e5209f30ccf0be41bc9b708c184fd260dff4f7cc80ea601e71c
SHA512ec1ea746e7d105db861cd0a39047e34c9ca588570939224371b4458cd5230b1445a2b0cc9ddf0d6f54196003ae47d1e8d35a3518c4fdd7dc98cb6fe1f1808905
-
Filesize
115KB
MD534629672023f707eb7117c981e9c5d1d
SHA1d9b8e3e7459d105c86fd9ca55461e121bc028d9f
SHA256abfde2d27485e1e70b598711aaa24e3ae70e4782f991914d6a175ff3bbf0867d
SHA5121c9ca8ac4bba76542ce5bb469b99d596cc2577b005aa3077aec31a6a441313d7f7720c856da5d4d1f0988fa56b1c8a27b52e8063a542aa897fd56eb084047877