Analysis
-
max time kernel
151s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:42
Static task
static1
Behavioral task
behavioral1
Sample
5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe
Resource
win10v2004-20221111-en
General
-
Target
5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe
-
Size
45KB
-
MD5
45a70b0a189b7fd233ffcf8c6d660431
-
SHA1
e52089d3c4b945048faea1fe72a10cb06c3150df
-
SHA256
5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376
-
SHA512
337a37ab912bf1392ae12f4eb977355aed341448b9b7df36cd09e9555d084487c5d29b22ad1c993e386719d0f7b92effdb25aee5dc7270341df3ae9a279ae11f
-
SSDEEP
768:E1AuwHyeFo6NPIFAoslbf8eRYLGXdoIFbb5omuKWcbsvwnoT9D88888888888JXH:EOxyeFo6NPCAosxYyXdF5oy3VoKH
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 8 IoCs
Processes:
CTFMON.EXESPOOLSV.EXESVCHOST.EXE5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\recycled\\SVCHOST.exe," CTFMON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" CTFMON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\recycled\\SVCHOST.exe," SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\recycled\\SVCHOST.exe," SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\recycled\\SVCHOST.exe," 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 4 IoCs
Processes:
SPOOLSV.EXESVCHOST.EXE5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exeCTFMON.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SPOOLSV.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SVCHOST.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" CTFMON.EXE -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 4 IoCs
Processes:
SPOOLSV.EXESVCHOST.EXE5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exeCTFMON.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SPOOLSV.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SVCHOST.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" CTFMON.EXE -
Executes dropped EXE 12 IoCs
Processes:
SVCHOST.EXESVCHOST.EXESPOOLSV.EXESVCHOST.EXESPOOLSV.EXECTFMON.EXESVCHOST.EXESPOOLSV.EXECTFMON.EXESPOOLSV.EXECTFMON.EXECTFMON.EXEpid process 1408 SVCHOST.EXE 3792 SVCHOST.EXE 2392 SPOOLSV.EXE 2524 SVCHOST.EXE 4400 SPOOLSV.EXE 3540 CTFMON.EXE 3996 SVCHOST.EXE 3388 SPOOLSV.EXE 5048 CTFMON.EXE 4160 SPOOLSV.EXE 920 CTFMON.EXE 2860 CTFMON.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exedescription ioc process File opened for modification C:\Recycled\desktop.ini 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
SVCHOST.EXECTFMON.EXE5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exeSPOOLSV.EXEdescription ioc process File opened (read-only) \??\V: SVCHOST.EXE File opened (read-only) \??\K: CTFMON.EXE File opened (read-only) \??\L: CTFMON.EXE File opened (read-only) \??\W: 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe File opened (read-only) \??\X: 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe File opened (read-only) \??\Y: 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe File opened (read-only) \??\O: SVCHOST.EXE File opened (read-only) \??\T: SPOOLSV.EXE File opened (read-only) \??\I: 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe File opened (read-only) \??\T: 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe File opened (read-only) \??\K: SVCHOST.EXE File opened (read-only) \??\R: SPOOLSV.EXE File opened (read-only) \??\Z: SPOOLSV.EXE File opened (read-only) \??\H: CTFMON.EXE File opened (read-only) \??\U: CTFMON.EXE File opened (read-only) \??\P: SVCHOST.EXE File opened (read-only) \??\H: SPOOLSV.EXE File opened (read-only) \??\I: SPOOLSV.EXE File opened (read-only) \??\Y: SPOOLSV.EXE File opened (read-only) \??\F: CTFMON.EXE File opened (read-only) \??\G: CTFMON.EXE File opened (read-only) \??\J: CTFMON.EXE File opened (read-only) \??\O: 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe File opened (read-only) \??\P: 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe File opened (read-only) \??\W: SVCHOST.EXE File opened (read-only) \??\Q: SPOOLSV.EXE File opened (read-only) \??\E: CTFMON.EXE File opened (read-only) \??\H: 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe File opened (read-only) \??\U: 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe File opened (read-only) \??\E: SVCHOST.EXE File opened (read-only) \??\S: SPOOLSV.EXE File opened (read-only) \??\Y: SVCHOST.EXE File opened (read-only) \??\M: SPOOLSV.EXE File opened (read-only) \??\O: CTFMON.EXE File opened (read-only) \??\T: CTFMON.EXE File opened (read-only) \??\E: 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe File opened (read-only) \??\G: 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe File opened (read-only) \??\Q: SVCHOST.EXE File opened (read-only) \??\R: SVCHOST.EXE File opened (read-only) \??\J: SVCHOST.EXE File opened (read-only) \??\Z: CTFMON.EXE File opened (read-only) \??\Z: SVCHOST.EXE File opened (read-only) \??\G: SPOOLSV.EXE File opened (read-only) \??\J: SPOOLSV.EXE File opened (read-only) \??\I: CTFMON.EXE File opened (read-only) \??\F: 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe File opened (read-only) \??\N: SVCHOST.EXE File opened (read-only) \??\S: SVCHOST.EXE File opened (read-only) \??\U: SVCHOST.EXE File opened (read-only) \??\M: CTFMON.EXE File opened (read-only) \??\Q: CTFMON.EXE File opened (read-only) \??\W: CTFMON.EXE File opened (read-only) \??\X: CTFMON.EXE File opened (read-only) \??\L: 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe File opened (read-only) \??\Z: 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe File opened (read-only) \??\F: SPOOLSV.EXE File opened (read-only) \??\V: SPOOLSV.EXE File opened (read-only) \??\P: SPOOLSV.EXE File opened (read-only) \??\P: CTFMON.EXE File opened (read-only) \??\M: 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe File opened (read-only) \??\N: 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe File opened (read-only) \??\H: SVCHOST.EXE File opened (read-only) \??\N: SPOOLSV.EXE File opened (read-only) \??\J: 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe -
Drops file in Program Files directory 1 IoCs
Processes:
5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\Root\VFS\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\docicon.exe 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 29 IoCs
Processes:
5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exeSVCHOST.EXECTFMON.EXESPOOLSV.EXEdescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\INSTALL\COMMAND 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\*\TileInfo = "prop:Type;Size" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" CTFMON.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\*\QuickTip = "prop:Type;Size" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\*\QuickTip = "prop:Type;Size" 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ CTFMON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\*\TileInfo = "prop:Type;Size" CTFMON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\*\InfoTip = "prop:Type;Write;Size" 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\*\InfoTip = "prop:Type;Write;Size" SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\*\QuickTip = "prop:Type;Size" CTFMON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" CTFMON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\*\InfoTip = "prop:Type;Write;Size" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\*\QuickTip = "prop:Type;Size" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\CONFIG\COMMAND 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\INSTALL 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\*\TileInfo = "prop:Type;Size" 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\CONFIG 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\*\TileInfo = "prop:Type;Size" SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\*\InfoTip = "prop:Type;Write;Size" CTFMON.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4176 WINWORD.EXE 4176 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
SPOOLSV.EXESVCHOST.EXE5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exepid process 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 2392 SPOOLSV.EXE 1408 SVCHOST.EXE 1408 SVCHOST.EXE 1408 SVCHOST.EXE 1408 SVCHOST.EXE 1408 SVCHOST.EXE 1408 SVCHOST.EXE 1408 SVCHOST.EXE 1408 SVCHOST.EXE 1408 SVCHOST.EXE 1408 SVCHOST.EXE 1408 SVCHOST.EXE 1408 SVCHOST.EXE 1408 SVCHOST.EXE 1408 SVCHOST.EXE 1408 SVCHOST.EXE 1408 SVCHOST.EXE 1408 SVCHOST.EXE 1408 SVCHOST.EXE 1408 SVCHOST.EXE 1408 SVCHOST.EXE 1408 SVCHOST.EXE 1408 SVCHOST.EXE 1408 SVCHOST.EXE 1408 SVCHOST.EXE 4376 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe 4376 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe 4376 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe 4376 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
WINWORD.EXEpid process 4176 WINWORD.EXE 4176 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 22 IoCs
Processes:
5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exeSVCHOST.EXESVCHOST.EXESPOOLSV.EXESVCHOST.EXESPOOLSV.EXECTFMON.EXESVCHOST.EXESPOOLSV.EXESPOOLSV.EXECTFMON.EXECTFMON.EXECTFMON.EXEWINWORD.EXEpid process 4376 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe 1408 SVCHOST.EXE 3792 SVCHOST.EXE 2392 SPOOLSV.EXE 2524 SVCHOST.EXE 4400 SPOOLSV.EXE 3540 CTFMON.EXE 3996 SVCHOST.EXE 4160 SPOOLSV.EXE 3388 SPOOLSV.EXE 5048 CTFMON.EXE 2860 CTFMON.EXE 920 CTFMON.EXE 4176 WINWORD.EXE 4176 WINWORD.EXE 4176 WINWORD.EXE 4176 WINWORD.EXE 4176 WINWORD.EXE 4176 WINWORD.EXE 4176 WINWORD.EXE 4176 WINWORD.EXE 4176 WINWORD.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exeSVCHOST.EXESPOOLSV.EXECTFMON.EXEuserinit.exedescription pid process target process PID 4376 wrote to memory of 1408 4376 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe SVCHOST.EXE PID 4376 wrote to memory of 1408 4376 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe SVCHOST.EXE PID 4376 wrote to memory of 1408 4376 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe SVCHOST.EXE PID 1408 wrote to memory of 3792 1408 SVCHOST.EXE SVCHOST.EXE PID 1408 wrote to memory of 3792 1408 SVCHOST.EXE SVCHOST.EXE PID 1408 wrote to memory of 3792 1408 SVCHOST.EXE SVCHOST.EXE PID 1408 wrote to memory of 2392 1408 SVCHOST.EXE SPOOLSV.EXE PID 1408 wrote to memory of 2392 1408 SVCHOST.EXE SPOOLSV.EXE PID 1408 wrote to memory of 2392 1408 SVCHOST.EXE SPOOLSV.EXE PID 2392 wrote to memory of 2524 2392 SPOOLSV.EXE SVCHOST.EXE PID 2392 wrote to memory of 2524 2392 SPOOLSV.EXE SVCHOST.EXE PID 2392 wrote to memory of 2524 2392 SPOOLSV.EXE SVCHOST.EXE PID 2392 wrote to memory of 4400 2392 SPOOLSV.EXE SPOOLSV.EXE PID 2392 wrote to memory of 4400 2392 SPOOLSV.EXE SPOOLSV.EXE PID 2392 wrote to memory of 4400 2392 SPOOLSV.EXE SPOOLSV.EXE PID 2392 wrote to memory of 3540 2392 SPOOLSV.EXE CTFMON.EXE PID 2392 wrote to memory of 3540 2392 SPOOLSV.EXE CTFMON.EXE PID 2392 wrote to memory of 3540 2392 SPOOLSV.EXE CTFMON.EXE PID 3540 wrote to memory of 3996 3540 CTFMON.EXE SVCHOST.EXE PID 3540 wrote to memory of 3996 3540 CTFMON.EXE SVCHOST.EXE PID 3540 wrote to memory of 3996 3540 CTFMON.EXE SVCHOST.EXE PID 4376 wrote to memory of 3388 4376 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe SPOOLSV.EXE PID 4376 wrote to memory of 3388 4376 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe SPOOLSV.EXE PID 4376 wrote to memory of 3388 4376 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe SPOOLSV.EXE PID 1408 wrote to memory of 5048 1408 SVCHOST.EXE CTFMON.EXE PID 1408 wrote to memory of 5048 1408 SVCHOST.EXE CTFMON.EXE PID 1408 wrote to memory of 5048 1408 SVCHOST.EXE CTFMON.EXE PID 3540 wrote to memory of 4160 3540 CTFMON.EXE SPOOLSV.EXE PID 3540 wrote to memory of 4160 3540 CTFMON.EXE SPOOLSV.EXE PID 3540 wrote to memory of 4160 3540 CTFMON.EXE SPOOLSV.EXE PID 4376 wrote to memory of 920 4376 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe CTFMON.EXE PID 4376 wrote to memory of 920 4376 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe CTFMON.EXE PID 4376 wrote to memory of 920 4376 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe CTFMON.EXE PID 3540 wrote to memory of 2860 3540 CTFMON.EXE CTFMON.EXE PID 3540 wrote to memory of 2860 3540 CTFMON.EXE CTFMON.EXE PID 3540 wrote to memory of 2860 3540 CTFMON.EXE CTFMON.EXE PID 1408 wrote to memory of 372 1408 SVCHOST.EXE userinit.exe PID 1408 wrote to memory of 372 1408 SVCHOST.EXE userinit.exe PID 1408 wrote to memory of 372 1408 SVCHOST.EXE userinit.exe PID 372 wrote to memory of 1260 372 userinit.exe Explorer.exe PID 372 wrote to memory of 1260 372 userinit.exe Explorer.exe PID 372 wrote to memory of 1260 372 userinit.exe Explorer.exe PID 4376 wrote to memory of 4176 4376 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe WINWORD.EXE PID 4376 wrote to memory of 4176 4376 5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe"C:\Users\Admin\AppData\Local\Temp\5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3792
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2524
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4400
-
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent4⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3996
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4160
-
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2860
-
-
-
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5048
-
-
C:\Windows\SysWOW64\userinit.exeC:\Windows\system32\userinit.exe3⤵
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\Explorer.exeExplorer.exe "C:\recycled\SVCHOST.exe"4⤵PID:1260
-
-
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3388
-
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:920
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5407dbb9181ebcadac5ee9c8221b74af0381d2913c997e654523971eaf8de376.doc" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4176
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:540
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5ec50ac3228e078ad2bdfaf08fad058f6
SHA17a9035d7c774f78b6006dd17dbf8b0f8123769d9
SHA25660b4b0dea918e1b34fe85f28fb8aba042afd47a60735e8d3e41c8c30047e1003
SHA51238071127356f689e33b915234a335e51283f860a92a3c9109c6b73f1102f746c83ffa4f22b7938d816b9d9628f5ac3231d4e90a93f65e222f23f64d64e4004b5
-
Filesize
45KB
MD5ec50ac3228e078ad2bdfaf08fad058f6
SHA17a9035d7c774f78b6006dd17dbf8b0f8123769d9
SHA25660b4b0dea918e1b34fe85f28fb8aba042afd47a60735e8d3e41c8c30047e1003
SHA51238071127356f689e33b915234a335e51283f860a92a3c9109c6b73f1102f746c83ffa4f22b7938d816b9d9628f5ac3231d4e90a93f65e222f23f64d64e4004b5
-
Filesize
45KB
MD5ec50ac3228e078ad2bdfaf08fad058f6
SHA17a9035d7c774f78b6006dd17dbf8b0f8123769d9
SHA25660b4b0dea918e1b34fe85f28fb8aba042afd47a60735e8d3e41c8c30047e1003
SHA51238071127356f689e33b915234a335e51283f860a92a3c9109c6b73f1102f746c83ffa4f22b7938d816b9d9628f5ac3231d4e90a93f65e222f23f64d64e4004b5
-
Filesize
45KB
MD5ec50ac3228e078ad2bdfaf08fad058f6
SHA17a9035d7c774f78b6006dd17dbf8b0f8123769d9
SHA25660b4b0dea918e1b34fe85f28fb8aba042afd47a60735e8d3e41c8c30047e1003
SHA51238071127356f689e33b915234a335e51283f860a92a3c9109c6b73f1102f746c83ffa4f22b7938d816b9d9628f5ac3231d4e90a93f65e222f23f64d64e4004b5
-
Filesize
45KB
MD5deb6c5bbf55845566e3b66508dad7896
SHA199397f4f9a405e5aa62226a9b4cce9b80618bb3c
SHA2566dfb01c33ba553d791861cb23560c8723b1e30e0c9dba4ae979c45a9a29f6ee2
SHA512667efe4476eeece3ae2e8afb070908be27efb50ee3c546c54850558f0f0e04e97f47d8a0c30b956cf7ecbe684a57a76397fb68b11d8b62c563919181ff5be561
-
Filesize
45KB
MD5deb6c5bbf55845566e3b66508dad7896
SHA199397f4f9a405e5aa62226a9b4cce9b80618bb3c
SHA2566dfb01c33ba553d791861cb23560c8723b1e30e0c9dba4ae979c45a9a29f6ee2
SHA512667efe4476eeece3ae2e8afb070908be27efb50ee3c546c54850558f0f0e04e97f47d8a0c30b956cf7ecbe684a57a76397fb68b11d8b62c563919181ff5be561
-
Filesize
45KB
MD5deb6c5bbf55845566e3b66508dad7896
SHA199397f4f9a405e5aa62226a9b4cce9b80618bb3c
SHA2566dfb01c33ba553d791861cb23560c8723b1e30e0c9dba4ae979c45a9a29f6ee2
SHA512667efe4476eeece3ae2e8afb070908be27efb50ee3c546c54850558f0f0e04e97f47d8a0c30b956cf7ecbe684a57a76397fb68b11d8b62c563919181ff5be561
-
Filesize
45KB
MD5deb6c5bbf55845566e3b66508dad7896
SHA199397f4f9a405e5aa62226a9b4cce9b80618bb3c
SHA2566dfb01c33ba553d791861cb23560c8723b1e30e0c9dba4ae979c45a9a29f6ee2
SHA512667efe4476eeece3ae2e8afb070908be27efb50ee3c546c54850558f0f0e04e97f47d8a0c30b956cf7ecbe684a57a76397fb68b11d8b62c563919181ff5be561
-
Filesize
45KB
MD563ce81d618145528bf1072fbd6174b4a
SHA1fba47c1347c9b6c90bfb5701ddd9aca925aea865
SHA2564f7d791eb57c19a1f84a6cd103dd26ca61a3620d683a5e0137001b908c0602b0
SHA512e8a69b6badd12ed138e91ec373efd502c2c747a389c17dd7b809b2d0bb34c317562c322dedfadd76a987bfec3151cc97fabea288ecea26e0d2d3d4f31c04964f
-
Filesize
45KB
MD563ce81d618145528bf1072fbd6174b4a
SHA1fba47c1347c9b6c90bfb5701ddd9aca925aea865
SHA2564f7d791eb57c19a1f84a6cd103dd26ca61a3620d683a5e0137001b908c0602b0
SHA512e8a69b6badd12ed138e91ec373efd502c2c747a389c17dd7b809b2d0bb34c317562c322dedfadd76a987bfec3151cc97fabea288ecea26e0d2d3d4f31c04964f
-
Filesize
45KB
MD563ce81d618145528bf1072fbd6174b4a
SHA1fba47c1347c9b6c90bfb5701ddd9aca925aea865
SHA2564f7d791eb57c19a1f84a6cd103dd26ca61a3620d683a5e0137001b908c0602b0
SHA512e8a69b6badd12ed138e91ec373efd502c2c747a389c17dd7b809b2d0bb34c317562c322dedfadd76a987bfec3151cc97fabea288ecea26e0d2d3d4f31c04964f
-
Filesize
45KB
MD563ce81d618145528bf1072fbd6174b4a
SHA1fba47c1347c9b6c90bfb5701ddd9aca925aea865
SHA2564f7d791eb57c19a1f84a6cd103dd26ca61a3620d683a5e0137001b908c0602b0
SHA512e8a69b6badd12ed138e91ec373efd502c2c747a389c17dd7b809b2d0bb34c317562c322dedfadd76a987bfec3151cc97fabea288ecea26e0d2d3d4f31c04964f
-
Filesize
65B
MD5ad0b0b4416f06af436328a3c12dc491b
SHA1743c7ad130780de78ccbf75aa6f84298720ad3fa
SHA25623521de51ca1db2bc7b18e41de7693542235284667bf85f6c31902547a947416
SHA512884cd0cae3b31a594f387dae94fc1e0aacb4fd833f8a3368bdec7de0f9f3dc44337c7318895d9549aad579f95de71ff45e1618e75065a04c7894ad1d0d0eac56
-
Filesize
1KB
MD50269b6347e473980c5378044ac67aa1f
SHA1c3334de50e320ad8bce8398acff95c363d039245
SHA25668f5bd85c17975419bb4eacf615286d749bcb951e487813361837580b39ffee2
SHA512e5c525fe688ecd3926ae634a61dc48c4837d7e56aae00b22e4f7d824df804cb536f6df077d5f6c67f63f73832ba00249ed3a75ed40ec9db6e026041b28404d7b
-
Filesize
1KB
MD50269b6347e473980c5378044ac67aa1f
SHA1c3334de50e320ad8bce8398acff95c363d039245
SHA25668f5bd85c17975419bb4eacf615286d749bcb951e487813361837580b39ffee2
SHA512e5c525fe688ecd3926ae634a61dc48c4837d7e56aae00b22e4f7d824df804cb536f6df077d5f6c67f63f73832ba00249ed3a75ed40ec9db6e026041b28404d7b
-
Filesize
1KB
MD50269b6347e473980c5378044ac67aa1f
SHA1c3334de50e320ad8bce8398acff95c363d039245
SHA25668f5bd85c17975419bb4eacf615286d749bcb951e487813361837580b39ffee2
SHA512e5c525fe688ecd3926ae634a61dc48c4837d7e56aae00b22e4f7d824df804cb536f6df077d5f6c67f63f73832ba00249ed3a75ed40ec9db6e026041b28404d7b
-
Filesize
45KB
MD5ec50ac3228e078ad2bdfaf08fad058f6
SHA17a9035d7c774f78b6006dd17dbf8b0f8123769d9
SHA25660b4b0dea918e1b34fe85f28fb8aba042afd47a60735e8d3e41c8c30047e1003
SHA51238071127356f689e33b915234a335e51283f860a92a3c9109c6b73f1102f746c83ffa4f22b7938d816b9d9628f5ac3231d4e90a93f65e222f23f64d64e4004b5
-
Filesize
45KB
MD5deb6c5bbf55845566e3b66508dad7896
SHA199397f4f9a405e5aa62226a9b4cce9b80618bb3c
SHA2566dfb01c33ba553d791861cb23560c8723b1e30e0c9dba4ae979c45a9a29f6ee2
SHA512667efe4476eeece3ae2e8afb070908be27efb50ee3c546c54850558f0f0e04e97f47d8a0c30b956cf7ecbe684a57a76397fb68b11d8b62c563919181ff5be561
-
Filesize
45KB
MD563ce81d618145528bf1072fbd6174b4a
SHA1fba47c1347c9b6c90bfb5701ddd9aca925aea865
SHA2564f7d791eb57c19a1f84a6cd103dd26ca61a3620d683a5e0137001b908c0602b0
SHA512e8a69b6badd12ed138e91ec373efd502c2c747a389c17dd7b809b2d0bb34c317562c322dedfadd76a987bfec3151cc97fabea288ecea26e0d2d3d4f31c04964f