Analysis
-
max time kernel
152s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 15:31
Static task
static1
Behavioral task
behavioral1
Sample
dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe
Resource
win10v2004-20220812-en
General
-
Target
dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe
-
Size
44KB
-
MD5
e9d903adcf464c84e848dfd99b91b42d
-
SHA1
4752766f41027a781ecc0c1269561a092aab4962
-
SHA256
dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d
-
SHA512
c7e8704ee3f91b54c07a6475ac72ccb67fd5cd3b493b874ad25bbfac11cfd52ab198f96838c1a8c52b0b25160928b5375f8be1569b228d50929e13acb495a9ba
-
SSDEEP
768:UhwP3FyDD3jNBc6oMNcm1V6QGduH4jzokETPcbsvwnol9D88888888888JXT:0wP1yDDzzc6oMN31kUH4j8kETaVoIT
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\recycled\\SVCHOST.exe," dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\recycled\\SVCHOST.exe," CTFMON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" CTFMON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\recycled\\SVCHOST.exe," SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\recycled\\SVCHOST.exe," SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" SVCHOST.EXE -
Modifies visibility of file extensions in Explorer 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" CTFMON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SPOOLSV.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SVCHOST.EXE -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" CTFMON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SPOOLSV.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SVCHOST.EXE -
Executes dropped EXE 12 IoCs
pid Process 4072 SVCHOST.EXE 3056 SVCHOST.EXE 5116 SPOOLSV.EXE 4360 SVCHOST.EXE 4984 SPOOLSV.EXE 2040 CTFMON.EXE 1124 SVCHOST.EXE 2332 SPOOLSV.EXE 2616 CTFMON.EXE 2808 CTFMON.EXE 240 SPOOLSV.EXE 1536 CTFMON.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Recycled\desktop.ini dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: SVCHOST.EXE File opened (read-only) \??\V: SVCHOST.EXE File opened (read-only) \??\R: SPOOLSV.EXE File opened (read-only) \??\S: CTFMON.EXE File opened (read-only) \??\W: CTFMON.EXE File opened (read-only) \??\Y: CTFMON.EXE File opened (read-only) \??\F: dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe File opened (read-only) \??\I: SVCHOST.EXE File opened (read-only) \??\M: SPOOLSV.EXE File opened (read-only) \??\O: SPOOLSV.EXE File opened (read-only) \??\X: CTFMON.EXE File opened (read-only) \??\L: dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe File opened (read-only) \??\G: SVCHOST.EXE File opened (read-only) \??\J: SVCHOST.EXE File opened (read-only) \??\Y: SVCHOST.EXE File opened (read-only) \??\J: SPOOLSV.EXE File opened (read-only) \??\L: SPOOLSV.EXE File opened (read-only) \??\J: CTFMON.EXE File opened (read-only) \??\K: CTFMON.EXE File opened (read-only) \??\H: dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe File opened (read-only) \??\S: dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe File opened (read-only) \??\E: SVCHOST.EXE File opened (read-only) \??\R: SVCHOST.EXE File opened (read-only) \??\P: SPOOLSV.EXE File opened (read-only) \??\X: SPOOLSV.EXE File opened (read-only) \??\H: CTFMON.EXE File opened (read-only) \??\H: SPOOLSV.EXE File opened (read-only) \??\I: SPOOLSV.EXE File opened (read-only) \??\O: CTFMON.EXE File opened (read-only) \??\Z: CTFMON.EXE File opened (read-only) \??\R: dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe File opened (read-only) \??\U: dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe File opened (read-only) \??\F: SVCHOST.EXE File opened (read-only) \??\T: SVCHOST.EXE File opened (read-only) \??\E: dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe File opened (read-only) \??\T: dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe File opened (read-only) \??\X: dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe File opened (read-only) \??\S: SVCHOST.EXE File opened (read-only) \??\E: CTFMON.EXE File opened (read-only) \??\G: dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe File opened (read-only) \??\V: dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe File opened (read-only) \??\H: SVCHOST.EXE File opened (read-only) \??\P: SVCHOST.EXE File opened (read-only) \??\U: SVCHOST.EXE File opened (read-only) \??\E: SPOOLSV.EXE File opened (read-only) \??\V: SPOOLSV.EXE File opened (read-only) \??\P: CTFMON.EXE File opened (read-only) \??\Z: dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe File opened (read-only) \??\Q: SVCHOST.EXE File opened (read-only) \??\I: CTFMON.EXE File opened (read-only) \??\T: CTFMON.EXE File opened (read-only) \??\U: CTFMON.EXE File opened (read-only) \??\M: SVCHOST.EXE File opened (read-only) \??\N: SVCHOST.EXE File opened (read-only) \??\X: SVCHOST.EXE File opened (read-only) \??\Y: SPOOLSV.EXE File opened (read-only) \??\Q: CTFMON.EXE File opened (read-only) \??\J: dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe File opened (read-only) \??\Z: SVCHOST.EXE File opened (read-only) \??\G: SPOOLSV.EXE File opened (read-only) \??\W: SPOOLSV.EXE File opened (read-only) \??\L: CTFMON.EXE File opened (read-only) \??\V: CTFMON.EXE File opened (read-only) \??\K: dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\Root\VFS\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\docicon.exe dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Modifies registry class 29 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\TileInfo = "prop:Type;Size" dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\QuickTip = "prop:Type;Size" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\TileInfo = "prop:Type;Size" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\InfoTip = "prop:Type;Write;Size" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\CONFIG dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\QuickTip = "prop:Type;Size" SPOOLSV.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\INSTALL dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" CTFMON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\CONFIG\COMMAND dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\InfoTip = "prop:Type;Write;Size" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\TileInfo = "prop:Type;Size" SPOOLSV.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ CTFMON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\InfoTip = "prop:Type;Write;Size" CTFMON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\InfoTip = "prop:Type;Write;Size" dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" CTFMON.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\INSTALL\COMMAND dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\QuickTip = "prop:Type;Size" dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\QuickTip = "prop:Type;Size" CTFMON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\TileInfo = "prop:Type;Size" CTFMON.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4648 WINWORD.EXE 4648 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2040 CTFMON.EXE 2040 CTFMON.EXE 5116 SPOOLSV.EXE 5116 SPOOLSV.EXE 2040 CTFMON.EXE 2040 CTFMON.EXE 5116 SPOOLSV.EXE 5116 SPOOLSV.EXE 2040 CTFMON.EXE 2040 CTFMON.EXE 5116 SPOOLSV.EXE 5116 SPOOLSV.EXE 2040 CTFMON.EXE 2040 CTFMON.EXE 5116 SPOOLSV.EXE 5116 SPOOLSV.EXE 2040 CTFMON.EXE 2040 CTFMON.EXE 5116 SPOOLSV.EXE 5116 SPOOLSV.EXE 2040 CTFMON.EXE 2040 CTFMON.EXE 5116 SPOOLSV.EXE 5116 SPOOLSV.EXE 5116 SPOOLSV.EXE 5116 SPOOLSV.EXE 2040 CTFMON.EXE 5116 SPOOLSV.EXE 2040 CTFMON.EXE 5116 SPOOLSV.EXE 2040 CTFMON.EXE 2040 CTFMON.EXE 5116 SPOOLSV.EXE 2040 CTFMON.EXE 5116 SPOOLSV.EXE 2040 CTFMON.EXE 5116 SPOOLSV.EXE 5116 SPOOLSV.EXE 2040 CTFMON.EXE 5116 SPOOLSV.EXE 2040 CTFMON.EXE 5116 SPOOLSV.EXE 2040 CTFMON.EXE 5116 SPOOLSV.EXE 5116 SPOOLSV.EXE 2040 CTFMON.EXE 2040 CTFMON.EXE 2040 CTFMON.EXE 4072 SVCHOST.EXE 4072 SVCHOST.EXE 4072 SVCHOST.EXE 4072 SVCHOST.EXE 4072 SVCHOST.EXE 4072 SVCHOST.EXE 4072 SVCHOST.EXE 4072 SVCHOST.EXE 4072 SVCHOST.EXE 4072 SVCHOST.EXE 4072 SVCHOST.EXE 4072 SVCHOST.EXE 4072 SVCHOST.EXE 4072 SVCHOST.EXE 4072 SVCHOST.EXE 4072 SVCHOST.EXE -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 4592 dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe 4072 SVCHOST.EXE 3056 SVCHOST.EXE 5116 SPOOLSV.EXE 4360 SVCHOST.EXE 4984 SPOOLSV.EXE 2040 CTFMON.EXE 1124 SVCHOST.EXE 2332 SPOOLSV.EXE 2616 CTFMON.EXE 2808 CTFMON.EXE 240 SPOOLSV.EXE 1536 CTFMON.EXE 4648 WINWORD.EXE 4648 WINWORD.EXE 4648 WINWORD.EXE 4648 WINWORD.EXE 4648 WINWORD.EXE 4648 WINWORD.EXE 4648 WINWORD.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 4592 wrote to memory of 4072 4592 dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe 80 PID 4592 wrote to memory of 4072 4592 dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe 80 PID 4592 wrote to memory of 4072 4592 dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe 80 PID 4072 wrote to memory of 3056 4072 SVCHOST.EXE 81 PID 4072 wrote to memory of 3056 4072 SVCHOST.EXE 81 PID 4072 wrote to memory of 3056 4072 SVCHOST.EXE 81 PID 4072 wrote to memory of 5116 4072 SVCHOST.EXE 82 PID 4072 wrote to memory of 5116 4072 SVCHOST.EXE 82 PID 4072 wrote to memory of 5116 4072 SVCHOST.EXE 82 PID 5116 wrote to memory of 4360 5116 SPOOLSV.EXE 83 PID 5116 wrote to memory of 4360 5116 SPOOLSV.EXE 83 PID 5116 wrote to memory of 4360 5116 SPOOLSV.EXE 83 PID 5116 wrote to memory of 4984 5116 SPOOLSV.EXE 84 PID 5116 wrote to memory of 4984 5116 SPOOLSV.EXE 84 PID 5116 wrote to memory of 4984 5116 SPOOLSV.EXE 84 PID 5116 wrote to memory of 2040 5116 SPOOLSV.EXE 85 PID 5116 wrote to memory of 2040 5116 SPOOLSV.EXE 85 PID 5116 wrote to memory of 2040 5116 SPOOLSV.EXE 85 PID 2040 wrote to memory of 1124 2040 CTFMON.EXE 86 PID 2040 wrote to memory of 1124 2040 CTFMON.EXE 86 PID 2040 wrote to memory of 1124 2040 CTFMON.EXE 86 PID 2040 wrote to memory of 2332 2040 CTFMON.EXE 87 PID 2040 wrote to memory of 2332 2040 CTFMON.EXE 87 PID 2040 wrote to memory of 2332 2040 CTFMON.EXE 87 PID 2040 wrote to memory of 2616 2040 CTFMON.EXE 88 PID 2040 wrote to memory of 2616 2040 CTFMON.EXE 88 PID 2040 wrote to memory of 2616 2040 CTFMON.EXE 88 PID 4072 wrote to memory of 2808 4072 SVCHOST.EXE 89 PID 4072 wrote to memory of 2808 4072 SVCHOST.EXE 89 PID 4072 wrote to memory of 2808 4072 SVCHOST.EXE 89 PID 4592 wrote to memory of 240 4592 dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe 90 PID 4592 wrote to memory of 240 4592 dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe 90 PID 4592 wrote to memory of 240 4592 dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe 90 PID 4072 wrote to memory of 1472 4072 SVCHOST.EXE 91 PID 4072 wrote to memory of 1472 4072 SVCHOST.EXE 91 PID 4072 wrote to memory of 1472 4072 SVCHOST.EXE 91 PID 4592 wrote to memory of 1536 4592 dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe 92 PID 4592 wrote to memory of 1536 4592 dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe 92 PID 4592 wrote to memory of 1536 4592 dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe 92 PID 1472 wrote to memory of 4240 1472 userinit.exe 93 PID 1472 wrote to memory of 4240 1472 userinit.exe 93 PID 1472 wrote to memory of 4240 1472 userinit.exe 93 PID 4592 wrote to memory of 4648 4592 dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe 100 PID 4592 wrote to memory of 4648 4592 dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe"C:\Users\Admin\AppData\Local\Temp\dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3056
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4360
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4984
-
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent4⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1124
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2332
-
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2616
-
-
-
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
C:\Windows\SysWOW64\userinit.exeC:\Windows\system32\userinit.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\Explorer.exeExplorer.exe "C:\recycled\SVCHOST.exe"4⤵PID:4240
-
-
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:240
-
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1536
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\dab27d0b2235f29d526d4b12ba3c45141e944b621dec0da18fca9ad9475a2e7d.doc" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4648
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3148
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5df739646bf7698d041214bee6814952e
SHA1291e1ca7c5ed6776876155267f4ab05f7989565c
SHA256f6485f2fdd70a11fc89b476fa300c69f41c9f5220bf1c2845088261ad3048a03
SHA5123dbdf66eedd86617af08bca2c755397d02b9ae31128f68becd816d2546c718033c9d206f8d76a90887e32963ad04a1816d369ea2730831b7f1abf9ad123270b7
-
Filesize
44KB
MD5df739646bf7698d041214bee6814952e
SHA1291e1ca7c5ed6776876155267f4ab05f7989565c
SHA256f6485f2fdd70a11fc89b476fa300c69f41c9f5220bf1c2845088261ad3048a03
SHA5123dbdf66eedd86617af08bca2c755397d02b9ae31128f68becd816d2546c718033c9d206f8d76a90887e32963ad04a1816d369ea2730831b7f1abf9ad123270b7
-
Filesize
44KB
MD5df739646bf7698d041214bee6814952e
SHA1291e1ca7c5ed6776876155267f4ab05f7989565c
SHA256f6485f2fdd70a11fc89b476fa300c69f41c9f5220bf1c2845088261ad3048a03
SHA5123dbdf66eedd86617af08bca2c755397d02b9ae31128f68becd816d2546c718033c9d206f8d76a90887e32963ad04a1816d369ea2730831b7f1abf9ad123270b7
-
Filesize
44KB
MD5df739646bf7698d041214bee6814952e
SHA1291e1ca7c5ed6776876155267f4ab05f7989565c
SHA256f6485f2fdd70a11fc89b476fa300c69f41c9f5220bf1c2845088261ad3048a03
SHA5123dbdf66eedd86617af08bca2c755397d02b9ae31128f68becd816d2546c718033c9d206f8d76a90887e32963ad04a1816d369ea2730831b7f1abf9ad123270b7
-
Filesize
44KB
MD5fce82902274d0056401b15890bac31ec
SHA1f084524128fb44f73b334a999ba998316f44a038
SHA256c75c8a2e5161b73f2132f8291224a7101de5678c56e806973d0e22b8b821c5ee
SHA51225bb78fd621afbec0c2118952cbeddf5ffa3a3661813bbc9f61aaddd338fe0a89c58e01c9b426635537b8bdfdfad59ea9c76cea06bcc5f3edcbcca7b38fb9714
-
Filesize
44KB
MD5fce82902274d0056401b15890bac31ec
SHA1f084524128fb44f73b334a999ba998316f44a038
SHA256c75c8a2e5161b73f2132f8291224a7101de5678c56e806973d0e22b8b821c5ee
SHA51225bb78fd621afbec0c2118952cbeddf5ffa3a3661813bbc9f61aaddd338fe0a89c58e01c9b426635537b8bdfdfad59ea9c76cea06bcc5f3edcbcca7b38fb9714
-
Filesize
44KB
MD5fce82902274d0056401b15890bac31ec
SHA1f084524128fb44f73b334a999ba998316f44a038
SHA256c75c8a2e5161b73f2132f8291224a7101de5678c56e806973d0e22b8b821c5ee
SHA51225bb78fd621afbec0c2118952cbeddf5ffa3a3661813bbc9f61aaddd338fe0a89c58e01c9b426635537b8bdfdfad59ea9c76cea06bcc5f3edcbcca7b38fb9714
-
Filesize
44KB
MD5fce82902274d0056401b15890bac31ec
SHA1f084524128fb44f73b334a999ba998316f44a038
SHA256c75c8a2e5161b73f2132f8291224a7101de5678c56e806973d0e22b8b821c5ee
SHA51225bb78fd621afbec0c2118952cbeddf5ffa3a3661813bbc9f61aaddd338fe0a89c58e01c9b426635537b8bdfdfad59ea9c76cea06bcc5f3edcbcca7b38fb9714
-
Filesize
44KB
MD58dd78b96a5c35d100428d492dec842e9
SHA135937fcf89f12147c4f7f2f02e24e27f1d880ea3
SHA25607f7eb1f3c5d4f1b8b56604d348bcdec87348c0f1c6815d6115ad284dffff50f
SHA512809dc944411b34c953d2499a99b299b15b2d6c69b094986287195925a66fa9171594bf619dc49c8a0af0c91c6ed4e4234dfd0c1d2822cc85afd18cd82014add2
-
Filesize
44KB
MD58dd78b96a5c35d100428d492dec842e9
SHA135937fcf89f12147c4f7f2f02e24e27f1d880ea3
SHA25607f7eb1f3c5d4f1b8b56604d348bcdec87348c0f1c6815d6115ad284dffff50f
SHA512809dc944411b34c953d2499a99b299b15b2d6c69b094986287195925a66fa9171594bf619dc49c8a0af0c91c6ed4e4234dfd0c1d2822cc85afd18cd82014add2
-
Filesize
44KB
MD58dd78b96a5c35d100428d492dec842e9
SHA135937fcf89f12147c4f7f2f02e24e27f1d880ea3
SHA25607f7eb1f3c5d4f1b8b56604d348bcdec87348c0f1c6815d6115ad284dffff50f
SHA512809dc944411b34c953d2499a99b299b15b2d6c69b094986287195925a66fa9171594bf619dc49c8a0af0c91c6ed4e4234dfd0c1d2822cc85afd18cd82014add2
-
Filesize
44KB
MD58dd78b96a5c35d100428d492dec842e9
SHA135937fcf89f12147c4f7f2f02e24e27f1d880ea3
SHA25607f7eb1f3c5d4f1b8b56604d348bcdec87348c0f1c6815d6115ad284dffff50f
SHA512809dc944411b34c953d2499a99b299b15b2d6c69b094986287195925a66fa9171594bf619dc49c8a0af0c91c6ed4e4234dfd0c1d2822cc85afd18cd82014add2
-
Filesize
65B
MD5ad0b0b4416f06af436328a3c12dc491b
SHA1743c7ad130780de78ccbf75aa6f84298720ad3fa
SHA25623521de51ca1db2bc7b18e41de7693542235284667bf85f6c31902547a947416
SHA512884cd0cae3b31a594f387dae94fc1e0aacb4fd833f8a3368bdec7de0f9f3dc44337c7318895d9549aad579f95de71ff45e1618e75065a04c7894ad1d0d0eac56
-
Filesize
2KB
MD51a1dce35d60d2c70ca8894954fd5d384
SHA158547dd65d506c892290755010d0232da34ee000
SHA2562661c05273f33efa4b7faa6ed8a6f7e69a13ad86077f69ee285ece9cba57e44c
SHA5124abe37613145fabeb44ea4c28ecc827c8a0eb2b003e86ae7aef9be5687711fa7a294f17567ea0a70a6f14ab3cbe7886c83763a7c49278097fd53f0d11fd8154e
-
Filesize
2KB
MD51a1dce35d60d2c70ca8894954fd5d384
SHA158547dd65d506c892290755010d0232da34ee000
SHA2562661c05273f33efa4b7faa6ed8a6f7e69a13ad86077f69ee285ece9cba57e44c
SHA5124abe37613145fabeb44ea4c28ecc827c8a0eb2b003e86ae7aef9be5687711fa7a294f17567ea0a70a6f14ab3cbe7886c83763a7c49278097fd53f0d11fd8154e
-
Filesize
2KB
MD51a1dce35d60d2c70ca8894954fd5d384
SHA158547dd65d506c892290755010d0232da34ee000
SHA2562661c05273f33efa4b7faa6ed8a6f7e69a13ad86077f69ee285ece9cba57e44c
SHA5124abe37613145fabeb44ea4c28ecc827c8a0eb2b003e86ae7aef9be5687711fa7a294f17567ea0a70a6f14ab3cbe7886c83763a7c49278097fd53f0d11fd8154e
-
Filesize
44KB
MD5df739646bf7698d041214bee6814952e
SHA1291e1ca7c5ed6776876155267f4ab05f7989565c
SHA256f6485f2fdd70a11fc89b476fa300c69f41c9f5220bf1c2845088261ad3048a03
SHA5123dbdf66eedd86617af08bca2c755397d02b9ae31128f68becd816d2546c718033c9d206f8d76a90887e32963ad04a1816d369ea2730831b7f1abf9ad123270b7
-
Filesize
44KB
MD5fce82902274d0056401b15890bac31ec
SHA1f084524128fb44f73b334a999ba998316f44a038
SHA256c75c8a2e5161b73f2132f8291224a7101de5678c56e806973d0e22b8b821c5ee
SHA51225bb78fd621afbec0c2118952cbeddf5ffa3a3661813bbc9f61aaddd338fe0a89c58e01c9b426635537b8bdfdfad59ea9c76cea06bcc5f3edcbcca7b38fb9714
-
Filesize
44KB
MD58dd78b96a5c35d100428d492dec842e9
SHA135937fcf89f12147c4f7f2f02e24e27f1d880ea3
SHA25607f7eb1f3c5d4f1b8b56604d348bcdec87348c0f1c6815d6115ad284dffff50f
SHA512809dc944411b34c953d2499a99b299b15b2d6c69b094986287195925a66fa9171594bf619dc49c8a0af0c91c6ed4e4234dfd0c1d2822cc85afd18cd82014add2