Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:15
Static task
static1
Behavioral task
behavioral1
Sample
4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe
Resource
win10v2004-20220812-en
General
-
Target
4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe
-
Size
45KB
-
MD5
0a55a7fb53951bd641630925954bec57
-
SHA1
a78a373a36add2a44d47aea4659eed74aa67f0b1
-
SHA256
4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475
-
SHA512
571fd59005f7e5668d440f02a1f04b600e65be5c9e23bc2d5bb659475fa5526f0927e5a86cb10f6391f55b00295eed43f438c6abbba12f4d6bf6204abef0e8cd
-
SSDEEP
768:E1AuwHyeFo6NPIFAoslbf8eRYLGXdoIFbb5omuKWcbsvwnoT9D88888888888JXD:EOxyeFo6NPCAosxYyXdF5oy3VoKD
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 8 IoCs
Processes:
SVCHOST.EXE4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exeCTFMON.EXESPOOLSV.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\recycled\\SVCHOST.exe," 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\recycled\\SVCHOST.exe," CTFMON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" CTFMON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\recycled\\SVCHOST.exe," SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\recycled\\SVCHOST.exe," SVCHOST.EXE -
Modifies visibility of file extensions in Explorer 2 TTPs 4 IoCs
Processes:
CTFMON.EXESPOOLSV.EXESVCHOST.EXE4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" CTFMON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SPOOLSV.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SVCHOST.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 4 IoCs
Processes:
CTFMON.EXESPOOLSV.EXESVCHOST.EXE4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" CTFMON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SPOOLSV.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SVCHOST.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe -
Executes dropped EXE 12 IoCs
Processes:
SVCHOST.EXESVCHOST.EXESPOOLSV.EXESVCHOST.EXESPOOLSV.EXECTFMON.EXESVCHOST.EXESPOOLSV.EXECTFMON.EXECTFMON.EXESPOOLSV.EXECTFMON.EXEpid process 4404 SVCHOST.EXE 1548 SVCHOST.EXE 1344 SPOOLSV.EXE 3236 SVCHOST.EXE 1788 SPOOLSV.EXE 4920 CTFMON.EXE 4908 SVCHOST.EXE 2032 SPOOLSV.EXE 1104 CTFMON.EXE 972 CTFMON.EXE 1876 SPOOLSV.EXE 3388 CTFMON.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exedescription ioc process File opened for modification C:\Recycled\desktop.ini 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
SPOOLSV.EXECTFMON.EXESVCHOST.EXE4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exedescription ioc process File opened (read-only) \??\Q: SPOOLSV.EXE File opened (read-only) \??\U: SPOOLSV.EXE File opened (read-only) \??\E: CTFMON.EXE File opened (read-only) \??\G: CTFMON.EXE File opened (read-only) \??\U: SVCHOST.EXE File opened (read-only) \??\I: SPOOLSV.EXE File opened (read-only) \??\X: 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe File opened (read-only) \??\P: SVCHOST.EXE File opened (read-only) \??\X: SVCHOST.EXE File opened (read-only) \??\E: SPOOLSV.EXE File opened (read-only) \??\H: CTFMON.EXE File opened (read-only) \??\J: CTFMON.EXE File opened (read-only) \??\M: 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe File opened (read-only) \??\O: 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe File opened (read-only) \??\O: CTFMON.EXE File opened (read-only) \??\Z: CTFMON.EXE File opened (read-only) \??\R: SPOOLSV.EXE File opened (read-only) \??\W: SPOOLSV.EXE File opened (read-only) \??\Q: CTFMON.EXE File opened (read-only) \??\R: CTFMON.EXE File opened (read-only) \??\Y: CTFMON.EXE File opened (read-only) \??\M: SVCHOST.EXE File opened (read-only) \??\Y: SVCHOST.EXE File opened (read-only) \??\V: SVCHOST.EXE File opened (read-only) \??\P: 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe File opened (read-only) \??\K: SVCHOST.EXE File opened (read-only) \??\N: SPOOLSV.EXE File opened (read-only) \??\U: 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe File opened (read-only) \??\J: SVCHOST.EXE File opened (read-only) \??\P: CTFMON.EXE File opened (read-only) \??\L: 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe File opened (read-only) \??\G: SPOOLSV.EXE File opened (read-only) \??\K: CTFMON.EXE File opened (read-only) \??\S: SPOOLSV.EXE File opened (read-only) \??\Z: SPOOLSV.EXE File opened (read-only) \??\K: 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe File opened (read-only) \??\Z: SVCHOST.EXE File opened (read-only) \??\O: SPOOLSV.EXE File opened (read-only) \??\V: SPOOLSV.EXE File opened (read-only) \??\E: 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe File opened (read-only) \??\F: 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe File opened (read-only) \??\H: SVCHOST.EXE File opened (read-only) \??\I: SVCHOST.EXE File opened (read-only) \??\W: SVCHOST.EXE File opened (read-only) \??\K: SPOOLSV.EXE File opened (read-only) \??\I: CTFMON.EXE File opened (read-only) \??\M: CTFMON.EXE File opened (read-only) \??\Q: 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe File opened (read-only) \??\V: 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe File opened (read-only) \??\Q: SVCHOST.EXE File opened (read-only) \??\R: SVCHOST.EXE File opened (read-only) \??\W: CTFMON.EXE File opened (read-only) \??\N: 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe File opened (read-only) \??\S: 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe File opened (read-only) \??\T: SVCHOST.EXE File opened (read-only) \??\P: SPOOLSV.EXE File opened (read-only) \??\T: SPOOLSV.EXE File opened (read-only) \??\L: CTFMON.EXE File opened (read-only) \??\V: CTFMON.EXE File opened (read-only) \??\I: 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe File opened (read-only) \??\O: SVCHOST.EXE File opened (read-only) \??\Y: 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe File opened (read-only) \??\F: SVCHOST.EXE File opened (read-only) \??\S: SVCHOST.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\Root\VFS\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\docicon.exe 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Modifies registry class 29 IoCs
Processes:
4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exeSPOOLSV.EXECTFMON.EXESVCHOST.EXEdescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\CONFIG\COMMAND 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\QuickTip = "prop:Type;Size" 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\InfoTip = "prop:Type;Write;Size" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ CTFMON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\TileInfo = "prop:Type;Size" CTFMON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\INSTALL\COMMAND 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" CTFMON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\InfoTip = "prop:Type;Write;Size" CTFMON.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\QuickTip = "prop:Type;Size" SPOOLSV.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\CONFIG 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\InfoTip = "prop:Type;Write;Size" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\TileInfo = "prop:Type;Size" 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\QuickTip = "prop:Type;Size" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\TileInfo = "prop:Type;Size" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" CTFMON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\INSTALL 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\InfoTip = "prop:Type;Write;Size" 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\TileInfo = "prop:Type;Size" SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\QuickTip = "prop:Type;Size" CTFMON.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2932 WINWORD.EXE 2932 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
CTFMON.EXESPOOLSV.EXESVCHOST.EXEpid process 4920 CTFMON.EXE 4920 CTFMON.EXE 4920 CTFMON.EXE 4920 CTFMON.EXE 4920 CTFMON.EXE 4920 CTFMON.EXE 4920 CTFMON.EXE 4920 CTFMON.EXE 4920 CTFMON.EXE 4920 CTFMON.EXE 4920 CTFMON.EXE 4920 CTFMON.EXE 1344 SPOOLSV.EXE 1344 SPOOLSV.EXE 1344 SPOOLSV.EXE 1344 SPOOLSV.EXE 1344 SPOOLSV.EXE 1344 SPOOLSV.EXE 1344 SPOOLSV.EXE 1344 SPOOLSV.EXE 1344 SPOOLSV.EXE 1344 SPOOLSV.EXE 1344 SPOOLSV.EXE 1344 SPOOLSV.EXE 1344 SPOOLSV.EXE 1344 SPOOLSV.EXE 1344 SPOOLSV.EXE 1344 SPOOLSV.EXE 1344 SPOOLSV.EXE 1344 SPOOLSV.EXE 1344 SPOOLSV.EXE 1344 SPOOLSV.EXE 1344 SPOOLSV.EXE 1344 SPOOLSV.EXE 1344 SPOOLSV.EXE 1344 SPOOLSV.EXE 4404 SVCHOST.EXE 4404 SVCHOST.EXE 4404 SVCHOST.EXE 4404 SVCHOST.EXE 4404 SVCHOST.EXE 4404 SVCHOST.EXE 4404 SVCHOST.EXE 4404 SVCHOST.EXE 4404 SVCHOST.EXE 4404 SVCHOST.EXE 4404 SVCHOST.EXE 4404 SVCHOST.EXE 4404 SVCHOST.EXE 4404 SVCHOST.EXE 4404 SVCHOST.EXE 4404 SVCHOST.EXE 4920 CTFMON.EXE 4920 CTFMON.EXE 4404 SVCHOST.EXE 4404 SVCHOST.EXE 4920 CTFMON.EXE 4920 CTFMON.EXE 4404 SVCHOST.EXE 4404 SVCHOST.EXE 4920 CTFMON.EXE 4920 CTFMON.EXE 4404 SVCHOST.EXE 4920 CTFMON.EXE -
Suspicious use of SetWindowsHookEx 20 IoCs
Processes:
4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exeSVCHOST.EXESVCHOST.EXESPOOLSV.EXESVCHOST.EXESPOOLSV.EXECTFMON.EXESVCHOST.EXESPOOLSV.EXECTFMON.EXECTFMON.EXESPOOLSV.EXECTFMON.EXEWINWORD.EXEpid process 1404 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe 4404 SVCHOST.EXE 1548 SVCHOST.EXE 1344 SPOOLSV.EXE 3236 SVCHOST.EXE 1788 SPOOLSV.EXE 4920 CTFMON.EXE 4908 SVCHOST.EXE 2032 SPOOLSV.EXE 1104 CTFMON.EXE 972 CTFMON.EXE 1876 SPOOLSV.EXE 3388 CTFMON.EXE 2932 WINWORD.EXE 2932 WINWORD.EXE 2932 WINWORD.EXE 2932 WINWORD.EXE 2932 WINWORD.EXE 2932 WINWORD.EXE 2932 WINWORD.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exeSVCHOST.EXESPOOLSV.EXECTFMON.EXEuserinit.exedescription pid process target process PID 1404 wrote to memory of 4404 1404 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe SVCHOST.EXE PID 1404 wrote to memory of 4404 1404 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe SVCHOST.EXE PID 1404 wrote to memory of 4404 1404 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe SVCHOST.EXE PID 4404 wrote to memory of 1548 4404 SVCHOST.EXE SVCHOST.EXE PID 4404 wrote to memory of 1548 4404 SVCHOST.EXE SVCHOST.EXE PID 4404 wrote to memory of 1548 4404 SVCHOST.EXE SVCHOST.EXE PID 4404 wrote to memory of 1344 4404 SVCHOST.EXE SPOOLSV.EXE PID 4404 wrote to memory of 1344 4404 SVCHOST.EXE SPOOLSV.EXE PID 4404 wrote to memory of 1344 4404 SVCHOST.EXE SPOOLSV.EXE PID 1344 wrote to memory of 3236 1344 SPOOLSV.EXE SVCHOST.EXE PID 1344 wrote to memory of 3236 1344 SPOOLSV.EXE SVCHOST.EXE PID 1344 wrote to memory of 3236 1344 SPOOLSV.EXE SVCHOST.EXE PID 1344 wrote to memory of 1788 1344 SPOOLSV.EXE SPOOLSV.EXE PID 1344 wrote to memory of 1788 1344 SPOOLSV.EXE SPOOLSV.EXE PID 1344 wrote to memory of 1788 1344 SPOOLSV.EXE SPOOLSV.EXE PID 1344 wrote to memory of 4920 1344 SPOOLSV.EXE CTFMON.EXE PID 1344 wrote to memory of 4920 1344 SPOOLSV.EXE CTFMON.EXE PID 1344 wrote to memory of 4920 1344 SPOOLSV.EXE CTFMON.EXE PID 4920 wrote to memory of 4908 4920 CTFMON.EXE SVCHOST.EXE PID 4920 wrote to memory of 4908 4920 CTFMON.EXE SVCHOST.EXE PID 4920 wrote to memory of 4908 4920 CTFMON.EXE SVCHOST.EXE PID 4920 wrote to memory of 2032 4920 CTFMON.EXE SPOOLSV.EXE PID 4920 wrote to memory of 2032 4920 CTFMON.EXE SPOOLSV.EXE PID 4920 wrote to memory of 2032 4920 CTFMON.EXE SPOOLSV.EXE PID 4920 wrote to memory of 1104 4920 CTFMON.EXE CTFMON.EXE PID 4920 wrote to memory of 1104 4920 CTFMON.EXE CTFMON.EXE PID 4920 wrote to memory of 1104 4920 CTFMON.EXE CTFMON.EXE PID 4404 wrote to memory of 972 4404 SVCHOST.EXE CTFMON.EXE PID 4404 wrote to memory of 972 4404 SVCHOST.EXE CTFMON.EXE PID 4404 wrote to memory of 972 4404 SVCHOST.EXE CTFMON.EXE PID 1404 wrote to memory of 1876 1404 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe SPOOLSV.EXE PID 1404 wrote to memory of 1876 1404 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe SPOOLSV.EXE PID 1404 wrote to memory of 1876 1404 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe SPOOLSV.EXE PID 4404 wrote to memory of 3204 4404 SVCHOST.EXE userinit.exe PID 4404 wrote to memory of 3204 4404 SVCHOST.EXE userinit.exe PID 4404 wrote to memory of 3204 4404 SVCHOST.EXE userinit.exe PID 1404 wrote to memory of 3388 1404 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe CTFMON.EXE PID 1404 wrote to memory of 3388 1404 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe CTFMON.EXE PID 1404 wrote to memory of 3388 1404 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe CTFMON.EXE PID 3204 wrote to memory of 3488 3204 userinit.exe Explorer.exe PID 3204 wrote to memory of 3488 3204 userinit.exe Explorer.exe PID 3204 wrote to memory of 3488 3204 userinit.exe Explorer.exe PID 1404 wrote to memory of 2932 1404 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe WINWORD.EXE PID 1404 wrote to memory of 2932 1404 4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe"C:\Users\Admin\AppData\Local\Temp\4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1548 -
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3236 -
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1788 -
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent4⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4908 -
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2032 -
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1104 -
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:972 -
C:\Windows\SysWOW64\userinit.exeC:\Windows\system32\userinit.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\Explorer.exeExplorer.exe "C:\recycled\SVCHOST.exe"4⤵PID:3488
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1876 -
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3388 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\4704beb76220f05db53d767ef764256d6ff0831e47b382523aff135e18906475.doc" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2932
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD558afc26e17fdaefa948302f8514c93b7
SHA1af4a7716ff3261a7b38e0c22d3bfcb7486b002c7
SHA256a85b01840a68428006d13be53ba0eb4bdac556130eb16ba9dc783b49747d3c1c
SHA51264ca8c35733c12c8d8007e6aad2a8b3411c13e3e8e659a16f2c58aac828fc142add30edcbb85d261e801549692a4a777096e9c8fff8bd780fc236c0f6f0abfec
-
Filesize
45KB
MD558afc26e17fdaefa948302f8514c93b7
SHA1af4a7716ff3261a7b38e0c22d3bfcb7486b002c7
SHA256a85b01840a68428006d13be53ba0eb4bdac556130eb16ba9dc783b49747d3c1c
SHA51264ca8c35733c12c8d8007e6aad2a8b3411c13e3e8e659a16f2c58aac828fc142add30edcbb85d261e801549692a4a777096e9c8fff8bd780fc236c0f6f0abfec
-
Filesize
45KB
MD558afc26e17fdaefa948302f8514c93b7
SHA1af4a7716ff3261a7b38e0c22d3bfcb7486b002c7
SHA256a85b01840a68428006d13be53ba0eb4bdac556130eb16ba9dc783b49747d3c1c
SHA51264ca8c35733c12c8d8007e6aad2a8b3411c13e3e8e659a16f2c58aac828fc142add30edcbb85d261e801549692a4a777096e9c8fff8bd780fc236c0f6f0abfec
-
Filesize
45KB
MD558afc26e17fdaefa948302f8514c93b7
SHA1af4a7716ff3261a7b38e0c22d3bfcb7486b002c7
SHA256a85b01840a68428006d13be53ba0eb4bdac556130eb16ba9dc783b49747d3c1c
SHA51264ca8c35733c12c8d8007e6aad2a8b3411c13e3e8e659a16f2c58aac828fc142add30edcbb85d261e801549692a4a777096e9c8fff8bd780fc236c0f6f0abfec
-
Filesize
45KB
MD57b3aaf50d51a2fb7888c48d94b73da20
SHA181c7eb48895d3ea8ad045fdc47d650b99038d50d
SHA256489035eb9e0f6bc22d5a352e7444415b87aee0fdae10f88a0677834967a43a62
SHA51216e29d7cc144163877ec992f1d9f21c882d8ba804ede436273834e584b05a0c3d1c0749ae129890b3312c0556859c5a43baa4ddc1cebbd364d625149d56e9bbf
-
Filesize
45KB
MD57b3aaf50d51a2fb7888c48d94b73da20
SHA181c7eb48895d3ea8ad045fdc47d650b99038d50d
SHA256489035eb9e0f6bc22d5a352e7444415b87aee0fdae10f88a0677834967a43a62
SHA51216e29d7cc144163877ec992f1d9f21c882d8ba804ede436273834e584b05a0c3d1c0749ae129890b3312c0556859c5a43baa4ddc1cebbd364d625149d56e9bbf
-
Filesize
45KB
MD57b3aaf50d51a2fb7888c48d94b73da20
SHA181c7eb48895d3ea8ad045fdc47d650b99038d50d
SHA256489035eb9e0f6bc22d5a352e7444415b87aee0fdae10f88a0677834967a43a62
SHA51216e29d7cc144163877ec992f1d9f21c882d8ba804ede436273834e584b05a0c3d1c0749ae129890b3312c0556859c5a43baa4ddc1cebbd364d625149d56e9bbf
-
Filesize
45KB
MD57b3aaf50d51a2fb7888c48d94b73da20
SHA181c7eb48895d3ea8ad045fdc47d650b99038d50d
SHA256489035eb9e0f6bc22d5a352e7444415b87aee0fdae10f88a0677834967a43a62
SHA51216e29d7cc144163877ec992f1d9f21c882d8ba804ede436273834e584b05a0c3d1c0749ae129890b3312c0556859c5a43baa4ddc1cebbd364d625149d56e9bbf
-
Filesize
45KB
MD55fdff9fbde69014b58a1fc6b7c6e754e
SHA19b7417b6e5c3c393d8c3e9297fe5b8629d1f8acf
SHA2569ed8a20f6841b63231b41919e765434e02418544f71a7eb3a9b00014569645f2
SHA512cc4eade9adb28db8a1bd2ccc4c9138b1a42da1a2b70e7c5de7d6b8425398ecf50a0f17ea086a64f6af42a503918608a9cfd59a43aeba46e0f2d80f7562eb01f6
-
Filesize
45KB
MD55fdff9fbde69014b58a1fc6b7c6e754e
SHA19b7417b6e5c3c393d8c3e9297fe5b8629d1f8acf
SHA2569ed8a20f6841b63231b41919e765434e02418544f71a7eb3a9b00014569645f2
SHA512cc4eade9adb28db8a1bd2ccc4c9138b1a42da1a2b70e7c5de7d6b8425398ecf50a0f17ea086a64f6af42a503918608a9cfd59a43aeba46e0f2d80f7562eb01f6
-
Filesize
45KB
MD55fdff9fbde69014b58a1fc6b7c6e754e
SHA19b7417b6e5c3c393d8c3e9297fe5b8629d1f8acf
SHA2569ed8a20f6841b63231b41919e765434e02418544f71a7eb3a9b00014569645f2
SHA512cc4eade9adb28db8a1bd2ccc4c9138b1a42da1a2b70e7c5de7d6b8425398ecf50a0f17ea086a64f6af42a503918608a9cfd59a43aeba46e0f2d80f7562eb01f6
-
Filesize
45KB
MD55fdff9fbde69014b58a1fc6b7c6e754e
SHA19b7417b6e5c3c393d8c3e9297fe5b8629d1f8acf
SHA2569ed8a20f6841b63231b41919e765434e02418544f71a7eb3a9b00014569645f2
SHA512cc4eade9adb28db8a1bd2ccc4c9138b1a42da1a2b70e7c5de7d6b8425398ecf50a0f17ea086a64f6af42a503918608a9cfd59a43aeba46e0f2d80f7562eb01f6
-
Filesize
65B
MD5ad0b0b4416f06af436328a3c12dc491b
SHA1743c7ad130780de78ccbf75aa6f84298720ad3fa
SHA25623521de51ca1db2bc7b18e41de7693542235284667bf85f6c31902547a947416
SHA512884cd0cae3b31a594f387dae94fc1e0aacb4fd833f8a3368bdec7de0f9f3dc44337c7318895d9549aad579f95de71ff45e1618e75065a04c7894ad1d0d0eac56
-
Filesize
1KB
MD50269b6347e473980c5378044ac67aa1f
SHA1c3334de50e320ad8bce8398acff95c363d039245
SHA25668f5bd85c17975419bb4eacf615286d749bcb951e487813361837580b39ffee2
SHA512e5c525fe688ecd3926ae634a61dc48c4837d7e56aae00b22e4f7d824df804cb536f6df077d5f6c67f63f73832ba00249ed3a75ed40ec9db6e026041b28404d7b
-
Filesize
1KB
MD50269b6347e473980c5378044ac67aa1f
SHA1c3334de50e320ad8bce8398acff95c363d039245
SHA25668f5bd85c17975419bb4eacf615286d749bcb951e487813361837580b39ffee2
SHA512e5c525fe688ecd3926ae634a61dc48c4837d7e56aae00b22e4f7d824df804cb536f6df077d5f6c67f63f73832ba00249ed3a75ed40ec9db6e026041b28404d7b
-
Filesize
1KB
MD50269b6347e473980c5378044ac67aa1f
SHA1c3334de50e320ad8bce8398acff95c363d039245
SHA25668f5bd85c17975419bb4eacf615286d749bcb951e487813361837580b39ffee2
SHA512e5c525fe688ecd3926ae634a61dc48c4837d7e56aae00b22e4f7d824df804cb536f6df077d5f6c67f63f73832ba00249ed3a75ed40ec9db6e026041b28404d7b
-
Filesize
45KB
MD558afc26e17fdaefa948302f8514c93b7
SHA1af4a7716ff3261a7b38e0c22d3bfcb7486b002c7
SHA256a85b01840a68428006d13be53ba0eb4bdac556130eb16ba9dc783b49747d3c1c
SHA51264ca8c35733c12c8d8007e6aad2a8b3411c13e3e8e659a16f2c58aac828fc142add30edcbb85d261e801549692a4a777096e9c8fff8bd780fc236c0f6f0abfec
-
Filesize
45KB
MD57b3aaf50d51a2fb7888c48d94b73da20
SHA181c7eb48895d3ea8ad045fdc47d650b99038d50d
SHA256489035eb9e0f6bc22d5a352e7444415b87aee0fdae10f88a0677834967a43a62
SHA51216e29d7cc144163877ec992f1d9f21c882d8ba804ede436273834e584b05a0c3d1c0749ae129890b3312c0556859c5a43baa4ddc1cebbd364d625149d56e9bbf
-
Filesize
45KB
MD55fdff9fbde69014b58a1fc6b7c6e754e
SHA19b7417b6e5c3c393d8c3e9297fe5b8629d1f8acf
SHA2569ed8a20f6841b63231b41919e765434e02418544f71a7eb3a9b00014569645f2
SHA512cc4eade9adb28db8a1bd2ccc4c9138b1a42da1a2b70e7c5de7d6b8425398ecf50a0f17ea086a64f6af42a503918608a9cfd59a43aeba46e0f2d80f7562eb01f6