Analysis
-
max time kernel
188s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 11:31
Behavioral task
behavioral1
Sample
9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe
Resource
win10v2004-20220812-en
General
-
Target
9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe
-
Size
42KB
-
MD5
9601004aa8ff3878128edbdf014fa699
-
SHA1
d35aa3a612ae9e3dc57daaa6a452f44cf642e62d
-
SHA256
9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414
-
SHA512
8dab3f8bd706e9c20272f22c947bb63a3df342fd5df61227d3ee2842f22526686d69f5d3debb4f5967a16427fe9b6e8b18c24c95416476b6f8c801b48d556468
-
SSDEEP
768:gSz0/XBwayCUOwV3TNZHdrPeqzEWvpbPwSMX6+w6pqZxLdeVgol9D88888888882:BzOCay4wV339rPjzbpLwRJ9pSdoIb
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\Fonts\\\u00a0Explorer.exe\"" SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\Fonts\\\u00a0Explorer.exe\"" CTFMON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" CTFMON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\Fonts\\\u00a0Explorer.exe\"" 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\Fonts\\\u00a0Explorer.exe\"" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" SVCHOST.EXE -
Modifies visibility of file extensions in Explorer 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SVCHOST.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SPOOLSV.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" CTFMON.EXE -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SPOOLSV.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" CTFMON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SVCHOST.EXE -
resource yara_rule behavioral2/files/0x0002000000021a93-136.dat aspack_v212_v242 behavioral2/files/0x0002000000021a93-138.dat aspack_v212_v242 behavioral2/files/0x0008000000022e2c-141.dat aspack_v212_v242 behavioral2/files/0x0002000000021a94-143.dat aspack_v212_v242 behavioral2/files/0x0002000000021a94-144.dat aspack_v212_v242 behavioral2/files/0x0008000000022e2c-148.dat aspack_v212_v242 behavioral2/files/0x0002000000021a93-151.dat aspack_v212_v242 behavioral2/files/0x0009000000022e27-156.dat aspack_v212_v242 behavioral2/files/0x0009000000022e27-157.dat aspack_v212_v242 behavioral2/files/0x0008000000022e2c-161.dat aspack_v212_v242 behavioral2/files/0x0002000000021a93-164.dat aspack_v212_v242 behavioral2/files/0x0002000000021a94-168.dat aspack_v212_v242 behavioral2/files/0x0002000000021a94-176.dat aspack_v212_v242 behavioral2/files/0x0002000000021a93-180.dat aspack_v212_v242 behavioral2/files/0x0009000000022e27-186.dat aspack_v212_v242 behavioral2/files/0x0009000000022e27-192.dat aspack_v212_v242 behavioral2/files/0x0002000000021a94-195.dat aspack_v212_v242 behavioral2/files/0x0009000000022e27-203.dat aspack_v212_v242 -
Executes dropped EXE 12 IoCs
pid Process 1968 SVCHOST.EXE 4804 SPOOLSV.EXE 4584 SVCHOST.EXE 4384 CTFMON.EXE 2012 SVCHOST.EXE 5064 SPOOLSV.EXE 4288 SPOOLSV.EXE 3560 SVCHOST.EXE 2032 CTFMON.EXE 3700 CTFMON.EXE 1060 SPOOLSV.EXE 3360 CTFMON.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Recycled\desktop.ini 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: SVCHOST.EXE File opened (read-only) \??\F: SPOOLSV.EXE File opened (read-only) \??\E: 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe File opened (read-only) \??\T: 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe File opened (read-only) \??\X: 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe File opened (read-only) \??\I: SVCHOST.EXE File opened (read-only) \??\K: SVCHOST.EXE File opened (read-only) \??\Q: SPOOLSV.EXE File opened (read-only) \??\Z: CTFMON.EXE File opened (read-only) \??\N: 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe File opened (read-only) \??\Z: 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe File opened (read-only) \??\F: SVCHOST.EXE File opened (read-only) \??\L: SPOOLSV.EXE File opened (read-only) \??\T: SPOOLSV.EXE File opened (read-only) \??\T: CTFMON.EXE File opened (read-only) \??\S: CTFMON.EXE File opened (read-only) \??\E: SVCHOST.EXE File opened (read-only) \??\G: SVCHOST.EXE File opened (read-only) \??\L: SVCHOST.EXE File opened (read-only) \??\W: SPOOLSV.EXE File opened (read-only) \??\G: CTFMON.EXE File opened (read-only) \??\O: CTFMON.EXE File opened (read-only) \??\Q: CTFMON.EXE File opened (read-only) \??\Y: 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe File opened (read-only) \??\H: CTFMON.EXE File opened (read-only) \??\W: CTFMON.EXE File opened (read-only) \??\U: CTFMON.EXE File opened (read-only) \??\L: 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe File opened (read-only) \??\O: SVCHOST.EXE File opened (read-only) \??\Q: SVCHOST.EXE File opened (read-only) \??\V: SVCHOST.EXE File opened (read-only) \??\W: SVCHOST.EXE File opened (read-only) \??\Y: SVCHOST.EXE File opened (read-only) \??\N: SPOOLSV.EXE File opened (read-only) \??\F: CTFMON.EXE File opened (read-only) \??\G: 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe File opened (read-only) \??\Q: 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe File opened (read-only) \??\R: 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe File opened (read-only) \??\U: 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe File opened (read-only) \??\H: SVCHOST.EXE File opened (read-only) \??\M: SVCHOST.EXE File opened (read-only) \??\R: SVCHOST.EXE File opened (read-only) \??\X: SVCHOST.EXE File opened (read-only) \??\J: SPOOLSV.EXE File opened (read-only) \??\J: CTFMON.EXE File opened (read-only) \??\V: CTFMON.EXE File opened (read-only) \??\Y: CTFMON.EXE File opened (read-only) \??\J: SVCHOST.EXE File opened (read-only) \??\G: SPOOLSV.EXE File opened (read-only) \??\H: SPOOLSV.EXE File opened (read-only) \??\I: SPOOLSV.EXE File opened (read-only) \??\J: 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe File opened (read-only) \??\K: 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe File opened (read-only) \??\P: 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe File opened (read-only) \??\R: SPOOLSV.EXE File opened (read-only) \??\P: SVCHOST.EXE File opened (read-only) \??\S: SVCHOST.EXE File opened (read-only) \??\P: SPOOLSV.EXE File opened (read-only) \??\S: SPOOLSV.EXE File opened (read-only) \??\P: CTFMON.EXE File opened (read-only) \??\M: 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe File opened (read-only) \??\W: 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe File opened (read-only) \??\Z: SVCHOST.EXE File opened (read-only) \??\K: SPOOLSV.EXE -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\Root\VFS\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\docicon.exe 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\ Explorer.exe 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe File opened for modification C:\Windows\Fonts\ Explorer.exe SVCHOST.EXE File opened for modification C:\Windows\Fonts\ Explorer.exe SPOOLSV.EXE File opened for modification C:\Windows\Fonts\ Explorer.exe CTFMON.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Modifies registry class 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\InfoTip = "prop:Type;Write;Size" 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" CTFMON.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\CONFIG 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\QuickTip = "prop:Type;Size" 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\QuickTip = "prop:Type;Size" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ CTFMON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ SPOOLSV.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\INSTALL 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\TileInfo = "prop:Type;Size" 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\QuickTip = "prop:Type;Size" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\TileInfo = "prop:Type;Size" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\CONFIG\COMMAND 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\InfoTip = "prop:Type;Write;Size" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\TileInfo = "prop:Type;Size" SPOOLSV.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\TileInfo = "prop:Type;Size" CTFMON.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\INSTALL\COMMAND 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" CTFMON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\QuickTip = "prop:Type;Size" CTFMON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\InfoTip = "prop:Type;Write;Size" CTFMON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\InfoTip = "prop:Type;Write;Size" SPOOLSV.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4184 WINWORD.EXE 4184 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1968 SVCHOST.EXE 1968 SVCHOST.EXE 1968 SVCHOST.EXE 1968 SVCHOST.EXE 1968 SVCHOST.EXE 1968 SVCHOST.EXE 1968 SVCHOST.EXE 1968 SVCHOST.EXE 1968 SVCHOST.EXE 1968 SVCHOST.EXE 1968 SVCHOST.EXE 1968 SVCHOST.EXE 4804 SPOOLSV.EXE 4804 SPOOLSV.EXE 4804 SPOOLSV.EXE 4804 SPOOLSV.EXE 4804 SPOOLSV.EXE 4804 SPOOLSV.EXE 4804 SPOOLSV.EXE 4804 SPOOLSV.EXE 4804 SPOOLSV.EXE 4804 SPOOLSV.EXE 4804 SPOOLSV.EXE 4804 SPOOLSV.EXE 4384 CTFMON.EXE 4384 CTFMON.EXE 4384 CTFMON.EXE 4384 CTFMON.EXE 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 4384 CTFMON.EXE 4384 CTFMON.EXE 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 4384 CTFMON.EXE 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 4384 CTFMON.EXE 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 4384 CTFMON.EXE 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 4384 CTFMON.EXE 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 4384 CTFMON.EXE 4384 CTFMON.EXE 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 1968 SVCHOST.EXE 1968 SVCHOST.EXE 1968 SVCHOST.EXE 1968 SVCHOST.EXE 1968 SVCHOST.EXE 1968 SVCHOST.EXE 1968 SVCHOST.EXE 1968 SVCHOST.EXE 1968 SVCHOST.EXE 1968 SVCHOST.EXE 1968 SVCHOST.EXE 1968 SVCHOST.EXE 4804 SPOOLSV.EXE 4804 SPOOLSV.EXE 4804 SPOOLSV.EXE 4804 SPOOLSV.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4184 WINWORD.EXE 4184 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 1968 SVCHOST.EXE 4804 SPOOLSV.EXE 4584 SVCHOST.EXE 4384 CTFMON.EXE 2012 SVCHOST.EXE 5064 SPOOLSV.EXE 4288 SPOOLSV.EXE 3560 SVCHOST.EXE 2032 CTFMON.EXE 1060 SPOOLSV.EXE 3700 CTFMON.EXE 3360 CTFMON.EXE 4184 WINWORD.EXE 4184 WINWORD.EXE 4184 WINWORD.EXE 4184 WINWORD.EXE 4184 WINWORD.EXE 4184 WINWORD.EXE 4184 WINWORD.EXE -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 4460 wrote to memory of 1968 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 81 PID 4460 wrote to memory of 1968 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 81 PID 4460 wrote to memory of 1968 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 81 PID 4460 wrote to memory of 4804 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 82 PID 4460 wrote to memory of 4804 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 82 PID 4460 wrote to memory of 4804 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 82 PID 4804 wrote to memory of 4584 4804 SPOOLSV.EXE 83 PID 4804 wrote to memory of 4584 4804 SPOOLSV.EXE 83 PID 4804 wrote to memory of 4584 4804 SPOOLSV.EXE 83 PID 4460 wrote to memory of 4384 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 84 PID 4460 wrote to memory of 4384 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 84 PID 4460 wrote to memory of 4384 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 84 PID 4384 wrote to memory of 2012 4384 CTFMON.EXE 85 PID 4384 wrote to memory of 2012 4384 CTFMON.EXE 85 PID 4384 wrote to memory of 2012 4384 CTFMON.EXE 85 PID 4804 wrote to memory of 5064 4804 SPOOLSV.EXE 86 PID 4804 wrote to memory of 5064 4804 SPOOLSV.EXE 86 PID 4804 wrote to memory of 5064 4804 SPOOLSV.EXE 86 PID 4384 wrote to memory of 4288 4384 CTFMON.EXE 87 PID 4384 wrote to memory of 4288 4384 CTFMON.EXE 87 PID 4384 wrote to memory of 4288 4384 CTFMON.EXE 87 PID 1968 wrote to memory of 3560 1968 SVCHOST.EXE 88 PID 1968 wrote to memory of 3560 1968 SVCHOST.EXE 88 PID 1968 wrote to memory of 3560 1968 SVCHOST.EXE 88 PID 4804 wrote to memory of 2032 4804 SPOOLSV.EXE 89 PID 4804 wrote to memory of 2032 4804 SPOOLSV.EXE 89 PID 4804 wrote to memory of 2032 4804 SPOOLSV.EXE 89 PID 4384 wrote to memory of 3700 4384 CTFMON.EXE 90 PID 4384 wrote to memory of 3700 4384 CTFMON.EXE 90 PID 4384 wrote to memory of 3700 4384 CTFMON.EXE 90 PID 1968 wrote to memory of 1060 1968 SVCHOST.EXE 91 PID 1968 wrote to memory of 1060 1968 SVCHOST.EXE 91 PID 1968 wrote to memory of 1060 1968 SVCHOST.EXE 91 PID 1968 wrote to memory of 3360 1968 SVCHOST.EXE 92 PID 1968 wrote to memory of 3360 1968 SVCHOST.EXE 92 PID 1968 wrote to memory of 3360 1968 SVCHOST.EXE 92 PID 4460 wrote to memory of 4184 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 93 PID 4460 wrote to memory of 4184 4460 9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe"C:\Users\Admin\AppData\Local\Temp\9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3560
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1060
-
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3360
-
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4584
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5064
-
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2032
-
-
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2012
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4288
-
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3700
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\9ce2381590c3096b7d6eba0cbd100b9d37097a89c95d87027398662b863af414.doc" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4184
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD59915c23beb6b4fb1e8ab3739d410a160
SHA14103f077144655bf2e73e1ce9fdce169eaacd3c1
SHA2564373efd03fa1a6b3b6b05a3434cced2fd78c43385c5d2371826f6406f2122a93
SHA5128c601a4e741b854d89ec87aac286aa4a3cc5bccb1079e8819bcd37e8316a07faac2f4dbf39d0f39868985619fba88e6de8fd9637996de094ad7a3c08b4234744
-
Filesize
42KB
MD59915c23beb6b4fb1e8ab3739d410a160
SHA14103f077144655bf2e73e1ce9fdce169eaacd3c1
SHA2564373efd03fa1a6b3b6b05a3434cced2fd78c43385c5d2371826f6406f2122a93
SHA5128c601a4e741b854d89ec87aac286aa4a3cc5bccb1079e8819bcd37e8316a07faac2f4dbf39d0f39868985619fba88e6de8fd9637996de094ad7a3c08b4234744
-
Filesize
42KB
MD59915c23beb6b4fb1e8ab3739d410a160
SHA14103f077144655bf2e73e1ce9fdce169eaacd3c1
SHA2564373efd03fa1a6b3b6b05a3434cced2fd78c43385c5d2371826f6406f2122a93
SHA5128c601a4e741b854d89ec87aac286aa4a3cc5bccb1079e8819bcd37e8316a07faac2f4dbf39d0f39868985619fba88e6de8fd9637996de094ad7a3c08b4234744
-
Filesize
42KB
MD59915c23beb6b4fb1e8ab3739d410a160
SHA14103f077144655bf2e73e1ce9fdce169eaacd3c1
SHA2564373efd03fa1a6b3b6b05a3434cced2fd78c43385c5d2371826f6406f2122a93
SHA5128c601a4e741b854d89ec87aac286aa4a3cc5bccb1079e8819bcd37e8316a07faac2f4dbf39d0f39868985619fba88e6de8fd9637996de094ad7a3c08b4234744
-
Filesize
42KB
MD5f0ad1920e425f735f5b12da012858bc6
SHA1e64bf1fd704a1b5cdd10995c648df22f733e8e9d
SHA25641803fdd17a8605b6681c617e2236d98f99ce6f753461368408870b27a5a9ecf
SHA51257bf6409a5bd548e50207426e43fcd0c47a4bb38ef04108de9df16c7e481a8a940ed602c623609c967a3a99e2f69043dd8deed86fa1ca3255dd9439023ba84b0
-
Filesize
42KB
MD5f0ad1920e425f735f5b12da012858bc6
SHA1e64bf1fd704a1b5cdd10995c648df22f733e8e9d
SHA25641803fdd17a8605b6681c617e2236d98f99ce6f753461368408870b27a5a9ecf
SHA51257bf6409a5bd548e50207426e43fcd0c47a4bb38ef04108de9df16c7e481a8a940ed602c623609c967a3a99e2f69043dd8deed86fa1ca3255dd9439023ba84b0
-
Filesize
42KB
MD5f0ad1920e425f735f5b12da012858bc6
SHA1e64bf1fd704a1b5cdd10995c648df22f733e8e9d
SHA25641803fdd17a8605b6681c617e2236d98f99ce6f753461368408870b27a5a9ecf
SHA51257bf6409a5bd548e50207426e43fcd0c47a4bb38ef04108de9df16c7e481a8a940ed602c623609c967a3a99e2f69043dd8deed86fa1ca3255dd9439023ba84b0
-
Filesize
42KB
MD5f0ad1920e425f735f5b12da012858bc6
SHA1e64bf1fd704a1b5cdd10995c648df22f733e8e9d
SHA25641803fdd17a8605b6681c617e2236d98f99ce6f753461368408870b27a5a9ecf
SHA51257bf6409a5bd548e50207426e43fcd0c47a4bb38ef04108de9df16c7e481a8a940ed602c623609c967a3a99e2f69043dd8deed86fa1ca3255dd9439023ba84b0
-
Filesize
42KB
MD56483cd0ccd953e91143b64f4daf08672
SHA1b81ef0fc1e33d58b39741099f598aaf7271d04e9
SHA25656437732745ed3e3159bdb8dd158877b2555581f11c5789c5abe2db6854aa5d4
SHA5127643bcc438485aeddd1f41c5576c372cc9ace9ebded821948bdbe90ca6c6a0fabdb9c399bcf511ba0aba8aaef504cc82f6a4c44d7ab0c3c443b65ccb8b35f121
-
Filesize
42KB
MD56483cd0ccd953e91143b64f4daf08672
SHA1b81ef0fc1e33d58b39741099f598aaf7271d04e9
SHA25656437732745ed3e3159bdb8dd158877b2555581f11c5789c5abe2db6854aa5d4
SHA5127643bcc438485aeddd1f41c5576c372cc9ace9ebded821948bdbe90ca6c6a0fabdb9c399bcf511ba0aba8aaef504cc82f6a4c44d7ab0c3c443b65ccb8b35f121
-
Filesize
42KB
MD56483cd0ccd953e91143b64f4daf08672
SHA1b81ef0fc1e33d58b39741099f598aaf7271d04e9
SHA25656437732745ed3e3159bdb8dd158877b2555581f11c5789c5abe2db6854aa5d4
SHA5127643bcc438485aeddd1f41c5576c372cc9ace9ebded821948bdbe90ca6c6a0fabdb9c399bcf511ba0aba8aaef504cc82f6a4c44d7ab0c3c443b65ccb8b35f121
-
Filesize
42KB
MD56483cd0ccd953e91143b64f4daf08672
SHA1b81ef0fc1e33d58b39741099f598aaf7271d04e9
SHA25656437732745ed3e3159bdb8dd158877b2555581f11c5789c5abe2db6854aa5d4
SHA5127643bcc438485aeddd1f41c5576c372cc9ace9ebded821948bdbe90ca6c6a0fabdb9c399bcf511ba0aba8aaef504cc82f6a4c44d7ab0c3c443b65ccb8b35f121
-
Filesize
2KB
MD51a1dce35d60d2c70ca8894954fd5d384
SHA158547dd65d506c892290755010d0232da34ee000
SHA2562661c05273f33efa4b7faa6ed8a6f7e69a13ad86077f69ee285ece9cba57e44c
SHA5124abe37613145fabeb44ea4c28ecc827c8a0eb2b003e86ae7aef9be5687711fa7a294f17567ea0a70a6f14ab3cbe7886c83763a7c49278097fd53f0d11fd8154e
-
Filesize
2KB
MD51a1dce35d60d2c70ca8894954fd5d384
SHA158547dd65d506c892290755010d0232da34ee000
SHA2562661c05273f33efa4b7faa6ed8a6f7e69a13ad86077f69ee285ece9cba57e44c
SHA5124abe37613145fabeb44ea4c28ecc827c8a0eb2b003e86ae7aef9be5687711fa7a294f17567ea0a70a6f14ab3cbe7886c83763a7c49278097fd53f0d11fd8154e
-
Filesize
2KB
MD51a1dce35d60d2c70ca8894954fd5d384
SHA158547dd65d506c892290755010d0232da34ee000
SHA2562661c05273f33efa4b7faa6ed8a6f7e69a13ad86077f69ee285ece9cba57e44c
SHA5124abe37613145fabeb44ea4c28ecc827c8a0eb2b003e86ae7aef9be5687711fa7a294f17567ea0a70a6f14ab3cbe7886c83763a7c49278097fd53f0d11fd8154e
-
Filesize
42KB
MD57f87b3ca4ee77cf0a1f723f984966900
SHA1a5f11e846ff14728560aebf0348ea4de6a67a420
SHA256ae7e2cad2c8d46f7fa35d139278357dd4fcd058b36c08e2c4f0c033c93b4fcde
SHA51208b1fb9ff60f798c5758ea7bcff4fd91be9a3b3794dda8d087282243fa9fa2fc7ae97c8ba2cf05b1240f64e5b5b969b0d7fcc953cb58bca19b5218ab77b21f4f
-
Filesize
42KB
MD5422733abb3c1e755cb258b38fa6cb886
SHA1ba31cb8d24e8c20303de7024c2dc25d1dd43eead
SHA25661d8e4e955f7201c836a3af562dcde1541ec5e2744515508b39ba4ba2b865b47
SHA51269a783153f692cd32b4028e012e13a2fb06b202145c4961cabd50a562d06fbed5952762f4daebfbb77316f2b5182c65660a507d0aa5cd4bdd9ceaccc903495b6
-
Filesize
42KB
MD5422733abb3c1e755cb258b38fa6cb886
SHA1ba31cb8d24e8c20303de7024c2dc25d1dd43eead
SHA25661d8e4e955f7201c836a3af562dcde1541ec5e2744515508b39ba4ba2b865b47
SHA51269a783153f692cd32b4028e012e13a2fb06b202145c4961cabd50a562d06fbed5952762f4daebfbb77316f2b5182c65660a507d0aa5cd4bdd9ceaccc903495b6
-
Filesize
2B
MD52b9d4fa85c8e82132bde46b143040142
SHA1a02431cf7c501a5b368c91e41283419d8fa9fb03
SHA2564658d6abbbaf7748c172ed5a3e003cdb8997648f88724834e41f75e54520e142
SHA512c37f27b442d578e94db6e5d879d026b0b3457f42b99ec56a9cb6fca3161540a32e207b942ef2ddb7be01fa9245ba4d8c859978a0f9a498c1ad8aa46d0890e6be
-
Filesize
42KB
MD59915c23beb6b4fb1e8ab3739d410a160
SHA14103f077144655bf2e73e1ce9fdce169eaacd3c1
SHA2564373efd03fa1a6b3b6b05a3434cced2fd78c43385c5d2371826f6406f2122a93
SHA5128c601a4e741b854d89ec87aac286aa4a3cc5bccb1079e8819bcd37e8316a07faac2f4dbf39d0f39868985619fba88e6de8fd9637996de094ad7a3c08b4234744
-
Filesize
42KB
MD5f0ad1920e425f735f5b12da012858bc6
SHA1e64bf1fd704a1b5cdd10995c648df22f733e8e9d
SHA25641803fdd17a8605b6681c617e2236d98f99ce6f753461368408870b27a5a9ecf
SHA51257bf6409a5bd548e50207426e43fcd0c47a4bb38ef04108de9df16c7e481a8a940ed602c623609c967a3a99e2f69043dd8deed86fa1ca3255dd9439023ba84b0
-
Filesize
42KB
MD56483cd0ccd953e91143b64f4daf08672
SHA1b81ef0fc1e33d58b39741099f598aaf7271d04e9
SHA25656437732745ed3e3159bdb8dd158877b2555581f11c5789c5abe2db6854aa5d4
SHA5127643bcc438485aeddd1f41c5576c372cc9ace9ebded821948bdbe90ca6c6a0fabdb9c399bcf511ba0aba8aaef504cc82f6a4c44d7ab0c3c443b65ccb8b35f121