Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 16:06
Static task
static1
Behavioral task
behavioral1
Sample
4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe
Resource
win10v2004-20221111-en
General
-
Target
4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe
-
Size
586KB
-
MD5
4cd1844f73c8ab6346f0fcac06597c96
-
SHA1
d72b2af26d479a091492f8840da8caf5b192bb2f
-
SHA256
4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f
-
SHA512
eb9bd53e79f7b4a9d81bfde011c6959753551b4c2bd3ae6aebea9ea007c098ca6a37fb2be0db9bb98bd28a7cfc4a0654141bd0378ac22c1eae59aa5a3e95d834
-
SSDEEP
12288:RlZOn5NPWJAJRBpWHWTGd1Gaibl6TNxN+eo4Nxm/v0GFV:Re5N+JER6XvGaKl6TJV6
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\zGKkIjsiJeYNc1WR\\bvd4Xhtqp07d.exe\",explorer.exe" 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe -
NirSoft MailPassView 11 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral1/memory/1680-68-0x0000000000400000-0x000000000048C000-memory.dmp MailPassView behavioral1/memory/1680-70-0x0000000000400000-0x000000000048C000-memory.dmp MailPassView behavioral1/memory/1680-72-0x0000000000485A8E-mapping.dmp MailPassView behavioral1/memory/1680-71-0x0000000000400000-0x000000000048C000-memory.dmp MailPassView behavioral1/memory/1680-74-0x0000000000400000-0x000000000048C000-memory.dmp MailPassView behavioral1/memory/1680-76-0x0000000000400000-0x000000000048C000-memory.dmp MailPassView behavioral1/memory/1436-81-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/1436-82-0x0000000000411654-mapping.dmp MailPassView behavioral1/memory/1436-85-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/1436-87-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/1436-95-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 10 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral1/memory/1680-68-0x0000000000400000-0x000000000048C000-memory.dmp WebBrowserPassView behavioral1/memory/1680-70-0x0000000000400000-0x000000000048C000-memory.dmp WebBrowserPassView behavioral1/memory/1680-72-0x0000000000485A8E-mapping.dmp WebBrowserPassView behavioral1/memory/1680-71-0x0000000000400000-0x000000000048C000-memory.dmp WebBrowserPassView behavioral1/memory/1680-74-0x0000000000400000-0x000000000048C000-memory.dmp WebBrowserPassView behavioral1/memory/1680-76-0x0000000000400000-0x000000000048C000-memory.dmp WebBrowserPassView behavioral1/memory/1596-88-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral1/memory/1596-89-0x0000000000442628-mapping.dmp WebBrowserPassView behavioral1/memory/1596-92-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral1/memory/1596-93-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView -
Nirsoft 15 IoCs
Processes:
resource yara_rule behavioral1/memory/1680-68-0x0000000000400000-0x000000000048C000-memory.dmp Nirsoft behavioral1/memory/1680-70-0x0000000000400000-0x000000000048C000-memory.dmp Nirsoft behavioral1/memory/1680-72-0x0000000000485A8E-mapping.dmp Nirsoft behavioral1/memory/1680-71-0x0000000000400000-0x000000000048C000-memory.dmp Nirsoft behavioral1/memory/1680-74-0x0000000000400000-0x000000000048C000-memory.dmp Nirsoft behavioral1/memory/1680-76-0x0000000000400000-0x000000000048C000-memory.dmp Nirsoft behavioral1/memory/1436-81-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1436-82-0x0000000000411654-mapping.dmp Nirsoft behavioral1/memory/1436-85-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1436-87-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1596-88-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral1/memory/1596-89-0x0000000000442628-mapping.dmp Nirsoft behavioral1/memory/1596-92-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral1/memory/1596-93-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral1/memory/1436-95-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 whatismyipaddress.com 6 whatismyipaddress.com 7 whatismyipaddress.com -
Suspicious use of SetThreadContext 3 IoCs
Processes:
4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exedescription pid process target process PID 1808 set thread context of 1680 1808 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe PID 1680 set thread context of 1436 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe vbc.exe PID 1680 set thread context of 1596 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE -
Modifies registry class 64 IoCs
Processes:
EXCEL.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1460 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exepid process 1808 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe 1808 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exedescription pid process Token: SeDebugPrivilege 1808 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe Token: SeDebugPrivilege 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
EXCEL.EXE4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exepid process 1460 EXCEL.EXE 1460 EXCEL.EXE 1460 EXCEL.EXE 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exedescription pid process target process PID 1808 wrote to memory of 1460 1808 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe EXCEL.EXE PID 1808 wrote to memory of 1460 1808 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe EXCEL.EXE PID 1808 wrote to memory of 1460 1808 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe EXCEL.EXE PID 1808 wrote to memory of 1460 1808 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe EXCEL.EXE PID 1808 wrote to memory of 1460 1808 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe EXCEL.EXE PID 1808 wrote to memory of 1460 1808 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe EXCEL.EXE PID 1808 wrote to memory of 1460 1808 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe EXCEL.EXE PID 1808 wrote to memory of 1460 1808 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe EXCEL.EXE PID 1808 wrote to memory of 1460 1808 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe EXCEL.EXE PID 1808 wrote to memory of 1680 1808 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe PID 1808 wrote to memory of 1680 1808 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe PID 1808 wrote to memory of 1680 1808 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe PID 1808 wrote to memory of 1680 1808 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe PID 1808 wrote to memory of 1680 1808 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe PID 1808 wrote to memory of 1680 1808 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe PID 1808 wrote to memory of 1680 1808 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe PID 1808 wrote to memory of 1680 1808 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe PID 1808 wrote to memory of 1680 1808 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe PID 1680 wrote to memory of 1436 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe vbc.exe PID 1680 wrote to memory of 1436 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe vbc.exe PID 1680 wrote to memory of 1436 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe vbc.exe PID 1680 wrote to memory of 1436 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe vbc.exe PID 1680 wrote to memory of 1436 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe vbc.exe PID 1680 wrote to memory of 1436 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe vbc.exe PID 1680 wrote to memory of 1436 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe vbc.exe PID 1680 wrote to memory of 1436 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe vbc.exe PID 1680 wrote to memory of 1436 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe vbc.exe PID 1680 wrote to memory of 1436 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe vbc.exe PID 1680 wrote to memory of 1596 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe vbc.exe PID 1680 wrote to memory of 1596 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe vbc.exe PID 1680 wrote to memory of 1596 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe vbc.exe PID 1680 wrote to memory of 1596 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe vbc.exe PID 1680 wrote to memory of 1596 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe vbc.exe PID 1680 wrote to memory of 1596 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe vbc.exe PID 1680 wrote to memory of 1596 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe vbc.exe PID 1680 wrote to memory of 1596 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe vbc.exe PID 1680 wrote to memory of 1596 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe vbc.exe PID 1680 wrote to memory of 1596 1680 4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe"C:\Users\Admin\AppData\Local\Temp\4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde2⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe"C:\Users\Admin\AppData\Local\Temp\4dfb6e970cba6f407f300f7aae1194748b6cf3965f589cb215a93a0158d5351f.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵
- Accesses Microsoft Outlook accounts
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\holdermail.txtFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Local\Temp\xdoUkg3snuu777Fv.xlsFilesize
32KB
MD5a4ecc1b737ae3d0acfba6df6c30473f4
SHA1ce1809cc0006fd5467edddf030cff0e84585fb7c
SHA2563566715c319f7187edcec6dbd175fd837551a1efbc9aa9e4397915d96e2a12a5
SHA5126d39e78e8678c1e4701b5471d30f2db2a23cc41d644232a5a3e4b3cc4c1b8122bbbf21d09713f190d463dd153818d266ba397385756a78698fdd24cea1a9f35f
-
memory/1436-81-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1436-82-0x0000000000411654-mapping.dmp
-
memory/1436-95-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1436-85-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1436-87-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1460-62-0x0000000070B7D000-0x0000000070B88000-memory.dmpFilesize
44KB
-
memory/1460-79-0x0000000070B7D000-0x0000000070B88000-memory.dmpFilesize
44KB
-
memory/1460-61-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1460-60-0x000000006FB91000-0x000000006FB93000-memory.dmpFilesize
8KB
-
memory/1460-59-0x000000002FED1000-0x000000002FED4000-memory.dmpFilesize
12KB
-
memory/1460-58-0x0000000000000000-mapping.dmp
-
memory/1460-97-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1460-98-0x0000000070B7D000-0x0000000070B88000-memory.dmpFilesize
44KB
-
memory/1596-93-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/1596-92-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/1596-89-0x0000000000442628-mapping.dmp
-
memory/1596-88-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/1680-74-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1680-68-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1680-78-0x0000000074CB0000-0x000000007525B000-memory.dmpFilesize
5.7MB
-
memory/1680-76-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1680-96-0x0000000000535000-0x0000000000546000-memory.dmpFilesize
68KB
-
memory/1680-86-0x0000000000535000-0x0000000000546000-memory.dmpFilesize
68KB
-
memory/1680-71-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1680-72-0x0000000000485A8E-mapping.dmp
-
memory/1680-70-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1680-66-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1680-80-0x0000000074CB0000-0x000000007525B000-memory.dmpFilesize
5.7MB
-
memory/1680-65-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1808-57-0x0000000000AB5000-0x0000000000AC6000-memory.dmpFilesize
68KB
-
memory/1808-54-0x00000000759F1000-0x00000000759F3000-memory.dmpFilesize
8KB
-
memory/1808-56-0x0000000074CB0000-0x000000007525B000-memory.dmpFilesize
5.7MB
-
memory/1808-55-0x0000000074CB0000-0x000000007525B000-memory.dmpFilesize
5.7MB