Analysis
-
max time kernel
100s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:39
Static task
static1
Behavioral task
behavioral1
Sample
2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe
Resource
win10v2004-20220812-en
General
-
Target
2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe
-
Size
847KB
-
MD5
85ddd555295bd869fe9c4ee07ca81c44
-
SHA1
5a358ba5d3e9f780972f3d67886882cb944492b5
-
SHA256
2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c
-
SHA512
19549d00437fb42333dd09f1cfa503ee5ab2999f89d1336d7b17303873593ccaf73998eaf0f441c02164f3cf7c60ee727250a8a06ae9eaf9e8f2e968647679bc
-
SSDEEP
24576:lX48QE+U2JGAUPZjHQKpQyVhqsMA0oPxD:lXz+rGAwDQqpAc0yxD
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
free_update1905.exesvchost.exepid process 1084 free_update1905.exe 1900 svchost.exe -
Drops startup file 1 IoCs
Processes:
2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\íàïîìèíàíèå.txt 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe -
Loads dropped DLL 3 IoCs
Processes:
2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exepid process 1840 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe 1840 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe 1840 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
free_update1905.exesvchost.exepid process 1084 free_update1905.exe 1900 svchost.exe -
Drops file in Program Files directory 4 IoCs
Processes:
2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exeEXCEL.EXEdescription ioc process File opened for modification C:\Program Files (x86)\WinRaR.inc\Àðõèâå WinRaR\free_update1905.exe 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe File opened for modification C:\Program Files (x86)\WinRaR.inc\Àðõèâå WinRaR\svchost.exe 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe File opened for modification C:\Program Files (x86)\WinRaR.inc\Àðõèâå WinRaR\STATS.xls 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe File opened for modification C:\Program Files (x86)\WinRaR.inc\Àðõèâå WinRaR\STATS.xls EXCEL.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEdescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE -
Modifies registry class 64 IoCs
Processes:
EXCEL.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1116 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
svchost.exefree_update1905.exepid process 1900 svchost.exe 1084 free_update1905.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid process 1116 EXCEL.EXE 1116 EXCEL.EXE 1116 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exedescription pid process target process PID 1840 wrote to memory of 1084 1840 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe free_update1905.exe PID 1840 wrote to memory of 1084 1840 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe free_update1905.exe PID 1840 wrote to memory of 1084 1840 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe free_update1905.exe PID 1840 wrote to memory of 1084 1840 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe free_update1905.exe PID 1840 wrote to memory of 1084 1840 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe free_update1905.exe PID 1840 wrote to memory of 1084 1840 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe free_update1905.exe PID 1840 wrote to memory of 1084 1840 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe free_update1905.exe PID 1840 wrote to memory of 1900 1840 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe svchost.exe PID 1840 wrote to memory of 1900 1840 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe svchost.exe PID 1840 wrote to memory of 1900 1840 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe svchost.exe PID 1840 wrote to memory of 1900 1840 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe svchost.exe PID 1840 wrote to memory of 1116 1840 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe EXCEL.EXE PID 1840 wrote to memory of 1116 1840 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe EXCEL.EXE PID 1840 wrote to memory of 1116 1840 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe EXCEL.EXE PID 1840 wrote to memory of 1116 1840 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe EXCEL.EXE PID 1840 wrote to memory of 1116 1840 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe EXCEL.EXE PID 1840 wrote to memory of 1116 1840 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe EXCEL.EXE PID 1840 wrote to memory of 1116 1840 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe EXCEL.EXE PID 1840 wrote to memory of 1116 1840 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe EXCEL.EXE PID 1840 wrote to memory of 1116 1840 2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe EXCEL.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe"C:\Users\Admin\AppData\Local\Temp\2a448ebda2c2366a8e29854838cfd2315cf4b58d45f23b396a7b884f1b07b13c.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\WinRaR.inc\Àðõèâå WinRaR\free_update1905.exe"C:\Program Files (x86)\WinRaR.inc\Àðõèâå WinRaR\free_update1905.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\WinRaR.inc\Àðõèâå WinRaR\svchost.exe"C:\Program Files (x86)\WinRaR.inc\Àðõèâå WinRaR\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde2⤵
- Drops file in Program Files directory
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\WinRaR.inc\Àðõèâå WinRaR\STATS.xlsFilesize
21KB
MD532c492aa3f4a4c3b57918455758bd88c
SHA18f2814531b1ae2ea908a45097ad19f845e69fba9
SHA256af81104c4ddf128e4ddc4d47f1f5c8ee8c4919b047bd3a633e3dcf8b50c8b8e5
SHA512e120ef2f2f9d2662e28ff8c67f3922a8391fcdf8d0932c3d9ee6ad74bb8b35b8a648ea2e5d81e34e4f5cdd75c78085f6edb09e25e557b4aaeda4a7d6ac6b9124
-
C:\Program Files (x86)\WinRaR.inc\Àðõèâå WinRaR\free_update1905.exeFilesize
231KB
MD560722dcf5e9d82dd40003b733df129c2
SHA1626e87d002de7dca5bb5723a5734e47b3a04648b
SHA2567351c2dc2aabc46700faeacd40cdf68f94a75903301d6210d7bc3326173319fe
SHA512d277e840d6cb5af8d818ea739b3e3a1e87ba22969a23c831152d17862a943ea056ac442aff93b772aeab9c9460be2bcbda28ffe8cdf081f037ef7470b1db813f
-
C:\Program Files (x86)\WinRaR.inc\Àðõèâå WinRaR\free_update1905.exeFilesize
231KB
MD560722dcf5e9d82dd40003b733df129c2
SHA1626e87d002de7dca5bb5723a5734e47b3a04648b
SHA2567351c2dc2aabc46700faeacd40cdf68f94a75903301d6210d7bc3326173319fe
SHA512d277e840d6cb5af8d818ea739b3e3a1e87ba22969a23c831152d17862a943ea056ac442aff93b772aeab9c9460be2bcbda28ffe8cdf081f037ef7470b1db813f
-
C:\Program Files (x86)\WinRaR.inc\Àðõèâå WinRaR\svchost.exeFilesize
430KB
MD5d0bafd78468ceef802dcbde8d93491f9
SHA1052a0c8068bcbc91058cf5b05be5ee4b82d07419
SHA2567e0a3e72aee4240cedaf09dbc7c1c9805cfbb41bb2fd0fb3997cae97b32f28c3
SHA51203133a07198875e7d28fc3a7b6e809a1506b09c6859923305b9a4aead1fc72ef3913532dd5d26adbdfab0769d29524e105002255e76c6bf1c083493e90af6f47
-
C:\Program Files (x86)\WinRaR.inc\Àðõèâå WinRaR\svchost.exeFilesize
430KB
MD5d0bafd78468ceef802dcbde8d93491f9
SHA1052a0c8068bcbc91058cf5b05be5ee4b82d07419
SHA2567e0a3e72aee4240cedaf09dbc7c1c9805cfbb41bb2fd0fb3997cae97b32f28c3
SHA51203133a07198875e7d28fc3a7b6e809a1506b09c6859923305b9a4aead1fc72ef3913532dd5d26adbdfab0769d29524e105002255e76c6bf1c083493e90af6f47
-
\Program Files (x86)\WinRaR.inc\Àðõèâå WinRaR\free_update1905.exeFilesize
231KB
MD560722dcf5e9d82dd40003b733df129c2
SHA1626e87d002de7dca5bb5723a5734e47b3a04648b
SHA2567351c2dc2aabc46700faeacd40cdf68f94a75903301d6210d7bc3326173319fe
SHA512d277e840d6cb5af8d818ea739b3e3a1e87ba22969a23c831152d17862a943ea056ac442aff93b772aeab9c9460be2bcbda28ffe8cdf081f037ef7470b1db813f
-
\Program Files (x86)\WinRaR.inc\Àðõèâå WinRaR\svchost.exeFilesize
430KB
MD5d0bafd78468ceef802dcbde8d93491f9
SHA1052a0c8068bcbc91058cf5b05be5ee4b82d07419
SHA2567e0a3e72aee4240cedaf09dbc7c1c9805cfbb41bb2fd0fb3997cae97b32f28c3
SHA51203133a07198875e7d28fc3a7b6e809a1506b09c6859923305b9a4aead1fc72ef3913532dd5d26adbdfab0769d29524e105002255e76c6bf1c083493e90af6f47
-
\Program Files (x86)\WinRaR.inc\Àðõèâå WinRaR\svchost.exeFilesize
430KB
MD5d0bafd78468ceef802dcbde8d93491f9
SHA1052a0c8068bcbc91058cf5b05be5ee4b82d07419
SHA2567e0a3e72aee4240cedaf09dbc7c1c9805cfbb41bb2fd0fb3997cae97b32f28c3
SHA51203133a07198875e7d28fc3a7b6e809a1506b09c6859923305b9a4aead1fc72ef3913532dd5d26adbdfab0769d29524e105002255e76c6bf1c083493e90af6f47
-
memory/1084-82-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1084-56-0x0000000000000000-mapping.dmp
-
memory/1084-86-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1084-65-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1084-87-0x0000000000340000-0x0000000000382000-memory.dmpFilesize
264KB
-
memory/1084-67-0x0000000000340000-0x0000000000382000-memory.dmpFilesize
264KB
-
memory/1084-84-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1084-83-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1116-72-0x0000000071C11000-0x0000000071C13000-memory.dmpFilesize
8KB
-
memory/1116-73-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1116-74-0x0000000072BFD000-0x0000000072C08000-memory.dmpFilesize
44KB
-
memory/1116-90-0x0000000072BFD000-0x0000000072C08000-memory.dmpFilesize
44KB
-
memory/1116-89-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1116-71-0x000000002F0F1000-0x000000002F0F4000-memory.dmpFilesize
12KB
-
memory/1116-70-0x0000000000000000-mapping.dmp
-
memory/1840-81-0x0000000002D50000-0x0000000002DB8000-memory.dmpFilesize
416KB
-
memory/1840-54-0x0000000076401000-0x0000000076403000-memory.dmpFilesize
8KB
-
memory/1840-64-0x0000000002D50000-0x0000000002DB8000-memory.dmpFilesize
416KB
-
memory/1840-66-0x0000000003320000-0x000000000340C000-memory.dmpFilesize
944KB
-
memory/1900-79-0x0000000000400000-0x00000000004EC000-memory.dmpFilesize
944KB
-
memory/1900-80-0x0000000000280000-0x00000000002C2000-memory.dmpFilesize
264KB
-
memory/1900-69-0x0000000000280000-0x00000000002C2000-memory.dmpFilesize
264KB
-
memory/1900-68-0x0000000000400000-0x00000000004EC000-memory.dmpFilesize
944KB
-
memory/1900-78-0x0000000000400000-0x00000000004EC000-memory.dmpFilesize
944KB
-
memory/1900-77-0x0000000000390000-0x0000000000393000-memory.dmpFilesize
12KB
-
memory/1900-61-0x0000000000000000-mapping.dmp
-
memory/1900-76-0x0000000000400000-0x00000000004EC000-memory.dmpFilesize
944KB
-
memory/1900-75-0x0000000000400000-0x00000000004EC000-memory.dmpFilesize
944KB