Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
194s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 16:51
Static task
static1
Behavioral task
behavioral1
Sample
7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe
Resource
win10v2004-20220812-en
General
-
Target
7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe
-
Size
45KB
-
MD5
26d925c763fbf9884e8e40aeeadcaeee
-
SHA1
2787780ec9cd357d3dec5eb2f9bb2fb2bdced57a
-
SHA256
7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95
-
SHA512
a4bc4293bae1df27539f32c2dc08a495d4cdd45d219bbe5c8b4f3931d245985a2ce7a194a698106fb0cce6c2141766ff1972281486b01e00604c49d413d93e67
-
SSDEEP
768:E1AuwHyeFo6NPIFAoslbf8eRYLGXdoIFbb5omuKWcbsvwnoT9D88888888888JXY:EOxyeFo6NPCAosxYyXdF5oy3VoKY
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\recycled\\SVCHOST.exe," SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\recycled\\SVCHOST.exe," CTFMON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" CTFMON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\recycled\\SVCHOST.exe," SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\recycled\\SVCHOST.exe," 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" CTFMON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SVCHOST.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SPOOLSV.EXE -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SPOOLSV.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" CTFMON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SVCHOST.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe -
Executes dropped EXE 12 IoCs
pid Process 3540 SVCHOST.EXE 4372 SVCHOST.EXE 4296 SPOOLSV.EXE 5052 SPOOLSV.EXE 3472 CTFMON.EXE 1640 SVCHOST.EXE 3092 CTFMON.EXE 1604 SPOOLSV.EXE 212 CTFMON.EXE 2712 SVCHOST.EXE 1280 SPOOLSV.EXE 5064 CTFMON.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Recycled\desktop.ini 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe File opened (read-only) \??\G: SVCHOST.EXE File opened (read-only) \??\P: CTFMON.EXE File opened (read-only) \??\Q: CTFMON.EXE File opened (read-only) \??\X: CTFMON.EXE File opened (read-only) \??\T: SVCHOST.EXE File opened (read-only) \??\J: SPOOLSV.EXE File opened (read-only) \??\N: SPOOLSV.EXE File opened (read-only) \??\T: SPOOLSV.EXE File opened (read-only) \??\I: CTFMON.EXE File opened (read-only) \??\U: SPOOLSV.EXE File opened (read-only) \??\N: 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe File opened (read-only) \??\F: SVCHOST.EXE File opened (read-only) \??\Y: SVCHOST.EXE File opened (read-only) \??\Z: SVCHOST.EXE File opened (read-only) \??\H: SPOOLSV.EXE File opened (read-only) \??\P: 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe File opened (read-only) \??\W: SVCHOST.EXE File opened (read-only) \??\J: CTFMON.EXE File opened (read-only) \??\W: CTFMON.EXE File opened (read-only) \??\L: SPOOLSV.EXE File opened (read-only) \??\R: SVCHOST.EXE File opened (read-only) \??\R: SPOOLSV.EXE File opened (read-only) \??\V: SPOOLSV.EXE File opened (read-only) \??\G: 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe File opened (read-only) \??\H: 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe File opened (read-only) \??\E: SVCHOST.EXE File opened (read-only) \??\O: SVCHOST.EXE File opened (read-only) \??\P: SVCHOST.EXE File opened (read-only) \??\O: CTFMON.EXE File opened (read-only) \??\Y: CTFMON.EXE File opened (read-only) \??\Z: SPOOLSV.EXE File opened (read-only) \??\M: CTFMON.EXE File opened (read-only) \??\Z: CTFMON.EXE File opened (read-only) \??\L: 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe File opened (read-only) \??\O: 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe File opened (read-only) \??\S: 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe File opened (read-only) \??\T: 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe File opened (read-only) \??\Z: 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe File opened (read-only) \??\Y: SPOOLSV.EXE File opened (read-only) \??\H: CTFMON.EXE File opened (read-only) \??\S: CTFMON.EXE File opened (read-only) \??\K: SVCHOST.EXE File opened (read-only) \??\U: SVCHOST.EXE File opened (read-only) \??\E: SPOOLSV.EXE File opened (read-only) \??\G: SPOOLSV.EXE File opened (read-only) \??\O: SPOOLSV.EXE File opened (read-only) \??\I: 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe File opened (read-only) \??\W: 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe File opened (read-only) \??\F: CTFMON.EXE File opened (read-only) \??\K: CTFMON.EXE File opened (read-only) \??\U: CTFMON.EXE File opened (read-only) \??\K: 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe File opened (read-only) \??\U: 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe File opened (read-only) \??\X: 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe File opened (read-only) \??\P: SPOOLSV.EXE File opened (read-only) \??\E: 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe File opened (read-only) \??\F: 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe File opened (read-only) \??\J: 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe File opened (read-only) \??\F: SPOOLSV.EXE File opened (read-only) \??\M: SPOOLSV.EXE File opened (read-only) \??\G: CTFMON.EXE File opened (read-only) \??\V: 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe File opened (read-only) \??\H: SVCHOST.EXE -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\Root\VFS\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\docicon.exe 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 29 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\QuickTip = "prop:Type;Size" SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\TileInfo = "prop:Type;Size" SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\InfoTip = "prop:Type;Write;Size" SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\QuickTip = "prop:Type;Size" CTFMON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\QuickTip = "prop:Type;Size" 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\InfoTip = "prop:Type;Write;Size" 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ CTFMON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\QuickTip = "prop:Type;Size" SVCHOST.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" CTFMON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\CONFIG 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\INSTALL 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\TileInfo = "prop:Type;Size" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" SPOOLSV.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\CONFIG\COMMAND 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\INSTALL\COMMAND 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\TileInfo = "prop:Type;Size" 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\TileInfo = "prop:Type;Size" CTFMON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\InfoTip = "prop:Type;Write;Size" CTFMON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\*\InfoTip = "prop:Type;Write;Size" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" CTFMON.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3360 WINWORD.EXE 3360 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3540 SVCHOST.EXE 3540 SVCHOST.EXE 3540 SVCHOST.EXE 3540 SVCHOST.EXE 3540 SVCHOST.EXE 3540 SVCHOST.EXE 3540 SVCHOST.EXE 3540 SVCHOST.EXE 3540 SVCHOST.EXE 3540 SVCHOST.EXE 3540 SVCHOST.EXE 3540 SVCHOST.EXE 3540 SVCHOST.EXE 3540 SVCHOST.EXE 3540 SVCHOST.EXE 3540 SVCHOST.EXE 3540 SVCHOST.EXE 3540 SVCHOST.EXE 3540 SVCHOST.EXE 3540 SVCHOST.EXE 3540 SVCHOST.EXE 3540 SVCHOST.EXE 3540 SVCHOST.EXE 3540 SVCHOST.EXE 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 3472 CTFMON.EXE 3472 CTFMON.EXE 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 3472 CTFMON.EXE 3472 CTFMON.EXE 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 3472 CTFMON.EXE 3472 CTFMON.EXE 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 3472 CTFMON.EXE 3472 CTFMON.EXE 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 3472 CTFMON.EXE 3472 CTFMON.EXE 3472 CTFMON.EXE 3472 CTFMON.EXE 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 4296 SPOOLSV.EXE 4296 SPOOLSV.EXE 4296 SPOOLSV.EXE 4296 SPOOLSV.EXE -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 3540 SVCHOST.EXE 4372 SVCHOST.EXE 4296 SPOOLSV.EXE 5052 SPOOLSV.EXE 3472 CTFMON.EXE 1640 SVCHOST.EXE 3092 CTFMON.EXE 1604 SPOOLSV.EXE 212 CTFMON.EXE 2712 SVCHOST.EXE 1280 SPOOLSV.EXE 5064 CTFMON.EXE 3360 WINWORD.EXE 3360 WINWORD.EXE 3360 WINWORD.EXE 3360 WINWORD.EXE 3360 WINWORD.EXE 3360 WINWORD.EXE 3360 WINWORD.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1108 wrote to memory of 3540 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 79 PID 1108 wrote to memory of 3540 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 79 PID 1108 wrote to memory of 3540 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 79 PID 3540 wrote to memory of 4372 3540 SVCHOST.EXE 80 PID 3540 wrote to memory of 4372 3540 SVCHOST.EXE 80 PID 3540 wrote to memory of 4372 3540 SVCHOST.EXE 80 PID 1108 wrote to memory of 4296 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 81 PID 1108 wrote to memory of 4296 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 81 PID 1108 wrote to memory of 4296 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 81 PID 3540 wrote to memory of 5052 3540 SVCHOST.EXE 82 PID 3540 wrote to memory of 5052 3540 SVCHOST.EXE 82 PID 3540 wrote to memory of 5052 3540 SVCHOST.EXE 82 PID 3540 wrote to memory of 3472 3540 SVCHOST.EXE 83 PID 3540 wrote to memory of 3472 3540 SVCHOST.EXE 83 PID 3540 wrote to memory of 3472 3540 SVCHOST.EXE 83 PID 4296 wrote to memory of 1640 4296 SPOOLSV.EXE 84 PID 4296 wrote to memory of 1640 4296 SPOOLSV.EXE 84 PID 4296 wrote to memory of 1640 4296 SPOOLSV.EXE 84 PID 1108 wrote to memory of 3092 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 85 PID 1108 wrote to memory of 3092 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 85 PID 1108 wrote to memory of 3092 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 85 PID 4296 wrote to memory of 1604 4296 SPOOLSV.EXE 86 PID 4296 wrote to memory of 1604 4296 SPOOLSV.EXE 86 PID 4296 wrote to memory of 1604 4296 SPOOLSV.EXE 86 PID 3540 wrote to memory of 2704 3540 SVCHOST.EXE 87 PID 3540 wrote to memory of 2704 3540 SVCHOST.EXE 87 PID 3540 wrote to memory of 2704 3540 SVCHOST.EXE 87 PID 4296 wrote to memory of 212 4296 SPOOLSV.EXE 88 PID 4296 wrote to memory of 212 4296 SPOOLSV.EXE 88 PID 4296 wrote to memory of 212 4296 SPOOLSV.EXE 88 PID 2704 wrote to memory of 1472 2704 userinit.exe 89 PID 2704 wrote to memory of 1472 2704 userinit.exe 89 PID 2704 wrote to memory of 1472 2704 userinit.exe 89 PID 3472 wrote to memory of 2712 3472 CTFMON.EXE 90 PID 3472 wrote to memory of 2712 3472 CTFMON.EXE 90 PID 3472 wrote to memory of 2712 3472 CTFMON.EXE 90 PID 3472 wrote to memory of 1280 3472 CTFMON.EXE 91 PID 3472 wrote to memory of 1280 3472 CTFMON.EXE 91 PID 3472 wrote to memory of 1280 3472 CTFMON.EXE 91 PID 3472 wrote to memory of 5064 3472 CTFMON.EXE 92 PID 3472 wrote to memory of 5064 3472 CTFMON.EXE 92 PID 3472 wrote to memory of 5064 3472 CTFMON.EXE 92 PID 1108 wrote to memory of 3360 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 94 PID 1108 wrote to memory of 3360 1108 7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe"C:\Users\Admin\AppData\Local\Temp\7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4372
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5052
-
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1280
-
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5064
-
-
-
C:\Windows\SysWOW64\userinit.exeC:\Windows\system32\userinit.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\Explorer.exeExplorer.exe "C:\recycled\SVCHOST.exe"4⤵PID:1472
-
-
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1640
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1604
-
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:212
-
-
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3092
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7f30de557dac87df619d85b2af49f45b39f16e9ae494a123330b6328c9a45d95.doc" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3360
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2032
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5108590201af21ca3048c3518ac763bf0
SHA1f73cdfa76fad4b3175d2de9f8fbf440082cd8293
SHA256abbf45de2148488c427ebdfd22abdf8c5b8ed3a5fdf1abb6ced8d8b89bd6c7a0
SHA5124071c14d390efc69c0d8f5101ccb3925f1ef074f0a1077680b456bb37ed5d51b42c0acf9b7354a5fe52e83cf354ae420ee5b5d73ba6f983fe62cbf859bf9daf7
-
Filesize
45KB
MD5108590201af21ca3048c3518ac763bf0
SHA1f73cdfa76fad4b3175d2de9f8fbf440082cd8293
SHA256abbf45de2148488c427ebdfd22abdf8c5b8ed3a5fdf1abb6ced8d8b89bd6c7a0
SHA5124071c14d390efc69c0d8f5101ccb3925f1ef074f0a1077680b456bb37ed5d51b42c0acf9b7354a5fe52e83cf354ae420ee5b5d73ba6f983fe62cbf859bf9daf7
-
Filesize
45KB
MD5108590201af21ca3048c3518ac763bf0
SHA1f73cdfa76fad4b3175d2de9f8fbf440082cd8293
SHA256abbf45de2148488c427ebdfd22abdf8c5b8ed3a5fdf1abb6ced8d8b89bd6c7a0
SHA5124071c14d390efc69c0d8f5101ccb3925f1ef074f0a1077680b456bb37ed5d51b42c0acf9b7354a5fe52e83cf354ae420ee5b5d73ba6f983fe62cbf859bf9daf7
-
Filesize
45KB
MD5108590201af21ca3048c3518ac763bf0
SHA1f73cdfa76fad4b3175d2de9f8fbf440082cd8293
SHA256abbf45de2148488c427ebdfd22abdf8c5b8ed3a5fdf1abb6ced8d8b89bd6c7a0
SHA5124071c14d390efc69c0d8f5101ccb3925f1ef074f0a1077680b456bb37ed5d51b42c0acf9b7354a5fe52e83cf354ae420ee5b5d73ba6f983fe62cbf859bf9daf7
-
Filesize
45KB
MD5b3b834a8767d00c7013402e09f414377
SHA1f8905765b5802071e708ca8c9c167067c3aa226b
SHA25654923a4f4563d73ff2817d1ca40790d40e0efc6862b0ce631b863abae0a86036
SHA512132cefb97247714d4e97fddee2d94849e6bc67549b02554c179c7a71a0a17ee412a5e108a49b3d1b1208dcb87ed15d9a4b4fcb6eee3208efb8c28842670597f1
-
Filesize
45KB
MD5b3b834a8767d00c7013402e09f414377
SHA1f8905765b5802071e708ca8c9c167067c3aa226b
SHA25654923a4f4563d73ff2817d1ca40790d40e0efc6862b0ce631b863abae0a86036
SHA512132cefb97247714d4e97fddee2d94849e6bc67549b02554c179c7a71a0a17ee412a5e108a49b3d1b1208dcb87ed15d9a4b4fcb6eee3208efb8c28842670597f1
-
Filesize
45KB
MD5b3b834a8767d00c7013402e09f414377
SHA1f8905765b5802071e708ca8c9c167067c3aa226b
SHA25654923a4f4563d73ff2817d1ca40790d40e0efc6862b0ce631b863abae0a86036
SHA512132cefb97247714d4e97fddee2d94849e6bc67549b02554c179c7a71a0a17ee412a5e108a49b3d1b1208dcb87ed15d9a4b4fcb6eee3208efb8c28842670597f1
-
Filesize
45KB
MD5b3b834a8767d00c7013402e09f414377
SHA1f8905765b5802071e708ca8c9c167067c3aa226b
SHA25654923a4f4563d73ff2817d1ca40790d40e0efc6862b0ce631b863abae0a86036
SHA512132cefb97247714d4e97fddee2d94849e6bc67549b02554c179c7a71a0a17ee412a5e108a49b3d1b1208dcb87ed15d9a4b4fcb6eee3208efb8c28842670597f1
-
Filesize
45KB
MD54619358c405715780730ca6d7ac6f578
SHA1cc474497e7f88dce3d54f4518e115e47a33a09f9
SHA2565c7857d0994da7344b7468816d7d04b0c2b83c15f2f223fa6809b1952fff71fd
SHA5123cceebf25e6ffd361eeaa226eae9bb2b4fb48f6419c2d1d4415e8263c3ace10d4ee0fb21960a05167ddd79ee24b0a67a71ef8482797377f50a34274989b2b1b7
-
Filesize
45KB
MD54619358c405715780730ca6d7ac6f578
SHA1cc474497e7f88dce3d54f4518e115e47a33a09f9
SHA2565c7857d0994da7344b7468816d7d04b0c2b83c15f2f223fa6809b1952fff71fd
SHA5123cceebf25e6ffd361eeaa226eae9bb2b4fb48f6419c2d1d4415e8263c3ace10d4ee0fb21960a05167ddd79ee24b0a67a71ef8482797377f50a34274989b2b1b7
-
Filesize
45KB
MD54619358c405715780730ca6d7ac6f578
SHA1cc474497e7f88dce3d54f4518e115e47a33a09f9
SHA2565c7857d0994da7344b7468816d7d04b0c2b83c15f2f223fa6809b1952fff71fd
SHA5123cceebf25e6ffd361eeaa226eae9bb2b4fb48f6419c2d1d4415e8263c3ace10d4ee0fb21960a05167ddd79ee24b0a67a71ef8482797377f50a34274989b2b1b7
-
Filesize
45KB
MD54619358c405715780730ca6d7ac6f578
SHA1cc474497e7f88dce3d54f4518e115e47a33a09f9
SHA2565c7857d0994da7344b7468816d7d04b0c2b83c15f2f223fa6809b1952fff71fd
SHA5123cceebf25e6ffd361eeaa226eae9bb2b4fb48f6419c2d1d4415e8263c3ace10d4ee0fb21960a05167ddd79ee24b0a67a71ef8482797377f50a34274989b2b1b7
-
Filesize
65B
MD5ad0b0b4416f06af436328a3c12dc491b
SHA1743c7ad130780de78ccbf75aa6f84298720ad3fa
SHA25623521de51ca1db2bc7b18e41de7693542235284667bf85f6c31902547a947416
SHA512884cd0cae3b31a594f387dae94fc1e0aacb4fd833f8a3368bdec7de0f9f3dc44337c7318895d9549aad579f95de71ff45e1618e75065a04c7894ad1d0d0eac56
-
Filesize
1KB
MD50269b6347e473980c5378044ac67aa1f
SHA1c3334de50e320ad8bce8398acff95c363d039245
SHA25668f5bd85c17975419bb4eacf615286d749bcb951e487813361837580b39ffee2
SHA512e5c525fe688ecd3926ae634a61dc48c4837d7e56aae00b22e4f7d824df804cb536f6df077d5f6c67f63f73832ba00249ed3a75ed40ec9db6e026041b28404d7b
-
Filesize
1KB
MD50269b6347e473980c5378044ac67aa1f
SHA1c3334de50e320ad8bce8398acff95c363d039245
SHA25668f5bd85c17975419bb4eacf615286d749bcb951e487813361837580b39ffee2
SHA512e5c525fe688ecd3926ae634a61dc48c4837d7e56aae00b22e4f7d824df804cb536f6df077d5f6c67f63f73832ba00249ed3a75ed40ec9db6e026041b28404d7b
-
Filesize
1KB
MD50269b6347e473980c5378044ac67aa1f
SHA1c3334de50e320ad8bce8398acff95c363d039245
SHA25668f5bd85c17975419bb4eacf615286d749bcb951e487813361837580b39ffee2
SHA512e5c525fe688ecd3926ae634a61dc48c4837d7e56aae00b22e4f7d824df804cb536f6df077d5f6c67f63f73832ba00249ed3a75ed40ec9db6e026041b28404d7b
-
Filesize
2B
MD52b9d4fa85c8e82132bde46b143040142
SHA1a02431cf7c501a5b368c91e41283419d8fa9fb03
SHA2564658d6abbbaf7748c172ed5a3e003cdb8997648f88724834e41f75e54520e142
SHA512c37f27b442d578e94db6e5d879d026b0b3457f42b99ec56a9cb6fca3161540a32e207b942ef2ddb7be01fa9245ba4d8c859978a0f9a498c1ad8aa46d0890e6be
-
Filesize
2B
MD52b9d4fa85c8e82132bde46b143040142
SHA1a02431cf7c501a5b368c91e41283419d8fa9fb03
SHA2564658d6abbbaf7748c172ed5a3e003cdb8997648f88724834e41f75e54520e142
SHA512c37f27b442d578e94db6e5d879d026b0b3457f42b99ec56a9cb6fca3161540a32e207b942ef2ddb7be01fa9245ba4d8c859978a0f9a498c1ad8aa46d0890e6be
-
Filesize
2B
MD52b9d4fa85c8e82132bde46b143040142
SHA1a02431cf7c501a5b368c91e41283419d8fa9fb03
SHA2564658d6abbbaf7748c172ed5a3e003cdb8997648f88724834e41f75e54520e142
SHA512c37f27b442d578e94db6e5d879d026b0b3457f42b99ec56a9cb6fca3161540a32e207b942ef2ddb7be01fa9245ba4d8c859978a0f9a498c1ad8aa46d0890e6be
-
Filesize
45KB
MD5108590201af21ca3048c3518ac763bf0
SHA1f73cdfa76fad4b3175d2de9f8fbf440082cd8293
SHA256abbf45de2148488c427ebdfd22abdf8c5b8ed3a5fdf1abb6ced8d8b89bd6c7a0
SHA5124071c14d390efc69c0d8f5101ccb3925f1ef074f0a1077680b456bb37ed5d51b42c0acf9b7354a5fe52e83cf354ae420ee5b5d73ba6f983fe62cbf859bf9daf7
-
Filesize
45KB
MD5b3b834a8767d00c7013402e09f414377
SHA1f8905765b5802071e708ca8c9c167067c3aa226b
SHA25654923a4f4563d73ff2817d1ca40790d40e0efc6862b0ce631b863abae0a86036
SHA512132cefb97247714d4e97fddee2d94849e6bc67549b02554c179c7a71a0a17ee412a5e108a49b3d1b1208dcb87ed15d9a4b4fcb6eee3208efb8c28842670597f1
-
Filesize
45KB
MD54619358c405715780730ca6d7ac6f578
SHA1cc474497e7f88dce3d54f4518e115e47a33a09f9
SHA2565c7857d0994da7344b7468816d7d04b0c2b83c15f2f223fa6809b1952fff71fd
SHA5123cceebf25e6ffd361eeaa226eae9bb2b4fb48f6419c2d1d4415e8263c3ace10d4ee0fb21960a05167ddd79ee24b0a67a71ef8482797377f50a34274989b2b1b7