Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 04:50
Static task
static1
Behavioral task
behavioral1
Sample
984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe
Resource
win10v2004-20221111-en
General
-
Target
984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe
-
Size
63KB
-
MD5
bd1ebf18f7f0ef1c309617f672ab8335
-
SHA1
739c9c16b2bb153ae5138a7318a58ad8ea261be1
-
SHA256
984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781
-
SHA512
5d27761802e455490f03d6d052feb69cdce1d5c80e25af6b987121fb5c0002b269f1ad1b38b7b7b40a31ff978457abda68129bacf32ede7fad6abb56d4bfa0c6
-
SSDEEP
1536:OrZtaewPBaF79KuUbYLAlBVOjEKHGkOqYtiHLl7ss:ODahPBarKpbqAjVOAiGklFLlss
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" Hole.zip Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe, \"C:\\Windows\\system32\\M5VBVM60.EXE StartUp\"" 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe, \"C:\\Windows\\system32\\M5VBVM60.EXE StartUp\"" Zero.txt -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWow64\\rund1132.exe %1" 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWow64\\rund1132.exe %1" Zero.txt -
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Zero.txt -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Zero.txt -
Executes dropped EXE 5 IoCs
pid Process 912 Empty.jpg 1292 Blank.doc 1072 Zero.txt 692 Hole.zip 1884 Unoccupied.reg -
Loads dropped DLL 15 IoCs
pid Process 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 912 Empty.jpg 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 1292 Blank.doc 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 1072 Zero.txt 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 692 Hole.zip 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 1884 Unoccupied.reg -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Blank AntiViri = "C:\\AUT0EXEC.BAT StartUp" Zero.txt Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Secure64 = "C:\\Windows\\system32\\dllcache\\Regedit32.com StartUp" Zero.txt Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Secure32 = "C:\\Windows\\system32\\dllcache\\Shell32.com StartUp" Zero.txt Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Blank AntiViri = "C:\\AUT0EXEC.BAT StartUp" 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Secure64 = "C:\\Windows\\system32\\dllcache\\Regedit32.com StartUp" 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Secure32 = "C:\\Windows\\system32\\dllcache\\Shell32.com StartUp" 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: Blank.doc File opened (read-only) \??\F: Blank.doc File opened (read-only) \??\G: Blank.doc File opened (read-only) \??\I: Blank.doc File opened (read-only) \??\K: Blank.doc File opened (read-only) \??\L: Blank.doc File opened (read-only) \??\M: Blank.doc File opened (read-only) \??\Q: Blank.doc File opened (read-only) \??\W: Blank.doc File opened (read-only) \??\Y: Blank.doc File opened (read-only) \??\H: Blank.doc File opened (read-only) \??\N: Blank.doc File opened (read-only) \??\X: Blank.doc File opened (read-only) \??\Z: Blank.doc File opened (read-only) \??\B: Blank.doc File opened (read-only) \??\O: Blank.doc File opened (read-only) \??\P: Blank.doc File opened (read-only) \??\R: Blank.doc File opened (read-only) \??\S: Blank.doc File opened (read-only) \??\T: Blank.doc File opened (read-only) \??\V: Blank.doc File opened (read-only) \??\E: Blank.doc File opened (read-only) \??\J: Blank.doc -
Drops file in System32 directory 26 IoCs
description ioc Process File created C:\Windows\SysWOW64\rund1132.exe 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File opened for modification C:\Windows\SysWOW64\rund1132.exe 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File created C:\Windows\SysWOW64\dllcache\Regedit32.com 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File opened for modification C:\Windows\SysWOW64\dllcache\Regedit32.com 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File opened for modification C:\Windows\SysWOW64\dllcache\Shell32.com 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File opened for modification C:\Windows\SysWOW64\M5VBVM60.EXE 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File created C:\Windows\SysWOW64\dllChache\Unoccupied.reg 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File opened for modification C:\Windows\SysWOW64\dllChache\Unoccupied.reg 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File opened for modification C:\Windows\SysWOW64\dllChache\Blank.doc 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File created C:\Windows\SysWOW64\dllcache\msvbvm60.dll 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File created C:\Windows\SysWOW64\dllChache\Empty.jpg 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File created C:\Windows\SysWOW64\dllChache\Zero.txt 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File created C:\Windows\SysWOW64\dllChache\Hole.zip 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File opened for modification C:\Windows\SysWOW64\dllChache\Hole.zip 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File created C:\Windows\SysWOW64\dllcache\Shell32.com 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File created C:\Windows\SysWOW64\dllchache.exe 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File created C:\Windows\SysWOW64\dllChache\msvbvm60.dll 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File opened for modification C:\Windows\SysWOW64\dllChache\msvbvm60.dll 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File opened for modification C:\Windows\SysWOW64\dllchache.exe 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File created C:\Windows\SysWOW64\dllChache\Blank.doc 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File opened for modification C:\Windows\SysWOW64\dllChache\Zero.txt 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File created C:\Windows\SysWOW64\M5VBVM60.EXE 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File opened for modification C:\Windows\SysWOW64\dllchache 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File opened for modification C:\Windows\SysWOW64\dllcache\msvbvm60.dll 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File opened for modification C:\Windows\SysWOW64\dllChache\Empty.jpg 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\system32.exe 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File opened for modification C:\Windows\SysWOW64 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe File opened for modification C:\Windows\system32.exe 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 41 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\rund1132.exe %1" 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWow64\\rund1132.exe %1" Zero.txt Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWow64\\rund1132.exe %1" 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\rund1132.exe %1" Zero.txt Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4a003100000000007e556c37102054656d700000360008000400efbe2155ef6b7e556c372a00000001020000000002000000000000000000000000000000540065006d007000000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 74003100000000002155ef6b1100557365727300600008000400efbeee3a851a2155ef6b2a000000e601000000000100000000000000000036000000000055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4c003100000000002155a879100041646d696e00380008000400efbe2155ef6b2155a8792a00000030000000000004000000000000000000000000000000410064006d0069006e00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 = c6003100000000007e556c3717003938344145317e310000ae0008000400efbe7e556c377e556c372a000000072301000000080000000000000000000000000000003900380034006100650031003600310035006500650063006100380038003900340034003300350038006400610064003000630038003900330066003900350035003200390038006600650039003000310061003900330034003100370064003400320032006600310066003900370030003600370063003200370038003100000018000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 4c0031000000000021554f6e10204c6f63616c00380008000400efbe2155ef6b21554f6e2a000000000200000000020000000000000000000000000000004c006f00630061006c00000014000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 52003100000000002155ef6b122041707044617461003c0008000400efbe2155ef6b2155ef6b2a000000ed0100000000020000000000000000000000000000004100700070004400610074006100000016000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 912 Empty.jpg 912 Empty.jpg 1292 Blank.doc 1292 Blank.doc 1072 Zero.txt 692 Hole.zip 1072 Zero.txt 692 Hole.zip 1884 Unoccupied.reg 1884 Unoccupied.reg 912 Empty.jpg 912 Empty.jpg 912 Empty.jpg 912 Empty.jpg 912 Empty.jpg 912 Empty.jpg 1292 Blank.doc 912 Empty.jpg 1292 Blank.doc 912 Empty.jpg 1072 Zero.txt 692 Hole.zip 1072 Zero.txt 692 Hole.zip 912 Empty.jpg 1884 Unoccupied.reg 912 Empty.jpg 1884 Unoccupied.reg 1292 Blank.doc 1292 Blank.doc 1072 Zero.txt 912 Empty.jpg 692 Hole.zip 1072 Zero.txt 692 Hole.zip 912 Empty.jpg 912 Empty.jpg 912 Empty.jpg 912 Empty.jpg 912 Empty.jpg 1292 Blank.doc 912 Empty.jpg 1292 Blank.doc 912 Empty.jpg 1884 Unoccupied.reg 1884 Unoccupied.reg 692 Hole.zip 1072 Zero.txt 692 Hole.zip 1072 Zero.txt 1292 Blank.doc 912 Empty.jpg 1292 Blank.doc 912 Empty.jpg 1884 Unoccupied.reg 1884 Unoccupied.reg 912 Empty.jpg 912 Empty.jpg 912 Empty.jpg -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 912 Empty.jpg 1292 Blank.doc 1072 Zero.txt 692 Hole.zip 1884 Unoccupied.reg -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 948 wrote to memory of 912 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 27 PID 948 wrote to memory of 912 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 27 PID 948 wrote to memory of 912 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 27 PID 948 wrote to memory of 912 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 27 PID 948 wrote to memory of 1292 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 28 PID 948 wrote to memory of 1292 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 28 PID 948 wrote to memory of 1292 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 28 PID 948 wrote to memory of 1292 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 28 PID 948 wrote to memory of 1072 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 29 PID 948 wrote to memory of 1072 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 29 PID 948 wrote to memory of 1072 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 29 PID 948 wrote to memory of 1072 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 29 PID 948 wrote to memory of 692 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 30 PID 948 wrote to memory of 692 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 30 PID 948 wrote to memory of 692 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 30 PID 948 wrote to memory of 692 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 30 PID 948 wrote to memory of 1884 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 31 PID 948 wrote to memory of 1884 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 31 PID 948 wrote to memory of 1884 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 31 PID 948 wrote to memory of 1884 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 31 PID 948 wrote to memory of 828 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 32 PID 948 wrote to memory of 828 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 32 PID 948 wrote to memory of 828 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 32 PID 948 wrote to memory of 828 948 984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe"C:\Users\Admin\AppData\Local\Temp\984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781.exe"1⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\dllChache\Empty.jpgC:\Windows\system32\dllChache\Empty.jpg ReStart2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:912
-
-
C:\Windows\SysWOW64\dllChache\Blank.docC:\Windows\system32\dllChache\Blank.doc ReStart2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1292
-
-
C:\Windows\SysWOW64\dllChache\Zero.txtC:\Windows\system32\dllChache\Zero.txt ReStart2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1072
-
-
C:\Windows\SysWOW64\dllChache\Hole.zipC:\Windows\system32\dllChache\Hole.zip ReStart2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:692
-
-
C:\Windows\SysWOW64\dllChache\Unoccupied.regC:\Windows\system32\dllChache\Unoccupied.reg ReStart2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1884
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Local\Temp\984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c27812⤵PID:828
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:1536
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
63KB
MD5bd1ebf18f7f0ef1c309617f672ab8335
SHA1739c9c16b2bb153ae5138a7318a58ad8ea261be1
SHA256984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781
SHA5125d27761802e455490f03d6d052feb69cdce1d5c80e25af6b987121fb5c0002b269f1ad1b38b7b7b40a31ff978457abda68129bacf32ede7fad6abb56d4bfa0c6
-
Filesize
63KB
MD5bd1ebf18f7f0ef1c309617f672ab8335
SHA1739c9c16b2bb153ae5138a7318a58ad8ea261be1
SHA256984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781
SHA5125d27761802e455490f03d6d052feb69cdce1d5c80e25af6b987121fb5c0002b269f1ad1b38b7b7b40a31ff978457abda68129bacf32ede7fad6abb56d4bfa0c6
-
Filesize
63KB
MD5bd1ebf18f7f0ef1c309617f672ab8335
SHA1739c9c16b2bb153ae5138a7318a58ad8ea261be1
SHA256984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781
SHA5125d27761802e455490f03d6d052feb69cdce1d5c80e25af6b987121fb5c0002b269f1ad1b38b7b7b40a31ff978457abda68129bacf32ede7fad6abb56d4bfa0c6
-
Filesize
63KB
MD5bd1ebf18f7f0ef1c309617f672ab8335
SHA1739c9c16b2bb153ae5138a7318a58ad8ea261be1
SHA256984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781
SHA5125d27761802e455490f03d6d052feb69cdce1d5c80e25af6b987121fb5c0002b269f1ad1b38b7b7b40a31ff978457abda68129bacf32ede7fad6abb56d4bfa0c6
-
Filesize
63KB
MD5bd1ebf18f7f0ef1c309617f672ab8335
SHA1739c9c16b2bb153ae5138a7318a58ad8ea261be1
SHA256984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781
SHA5125d27761802e455490f03d6d052feb69cdce1d5c80e25af6b987121fb5c0002b269f1ad1b38b7b7b40a31ff978457abda68129bacf32ede7fad6abb56d4bfa0c6
-
Filesize
63KB
MD5bd1ebf18f7f0ef1c309617f672ab8335
SHA1739c9c16b2bb153ae5138a7318a58ad8ea261be1
SHA256984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781
SHA5125d27761802e455490f03d6d052feb69cdce1d5c80e25af6b987121fb5c0002b269f1ad1b38b7b7b40a31ff978457abda68129bacf32ede7fad6abb56d4bfa0c6
-
Filesize
63KB
MD5bd1ebf18f7f0ef1c309617f672ab8335
SHA1739c9c16b2bb153ae5138a7318a58ad8ea261be1
SHA256984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781
SHA5125d27761802e455490f03d6d052feb69cdce1d5c80e25af6b987121fb5c0002b269f1ad1b38b7b7b40a31ff978457abda68129bacf32ede7fad6abb56d4bfa0c6
-
Filesize
63KB
MD5bd1ebf18f7f0ef1c309617f672ab8335
SHA1739c9c16b2bb153ae5138a7318a58ad8ea261be1
SHA256984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781
SHA5125d27761802e455490f03d6d052feb69cdce1d5c80e25af6b987121fb5c0002b269f1ad1b38b7b7b40a31ff978457abda68129bacf32ede7fad6abb56d4bfa0c6
-
Filesize
63KB
MD5bd1ebf18f7f0ef1c309617f672ab8335
SHA1739c9c16b2bb153ae5138a7318a58ad8ea261be1
SHA256984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781
SHA5125d27761802e455490f03d6d052feb69cdce1d5c80e25af6b987121fb5c0002b269f1ad1b38b7b7b40a31ff978457abda68129bacf32ede7fad6abb56d4bfa0c6
-
Filesize
63KB
MD5bd1ebf18f7f0ef1c309617f672ab8335
SHA1739c9c16b2bb153ae5138a7318a58ad8ea261be1
SHA256984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781
SHA5125d27761802e455490f03d6d052feb69cdce1d5c80e25af6b987121fb5c0002b269f1ad1b38b7b7b40a31ff978457abda68129bacf32ede7fad6abb56d4bfa0c6
-
Filesize
63KB
MD5bd1ebf18f7f0ef1c309617f672ab8335
SHA1739c9c16b2bb153ae5138a7318a58ad8ea261be1
SHA256984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781
SHA5125d27761802e455490f03d6d052feb69cdce1d5c80e25af6b987121fb5c0002b269f1ad1b38b7b7b40a31ff978457abda68129bacf32ede7fad6abb56d4bfa0c6
-
Filesize
63KB
MD5bd1ebf18f7f0ef1c309617f672ab8335
SHA1739c9c16b2bb153ae5138a7318a58ad8ea261be1
SHA256984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781
SHA5125d27761802e455490f03d6d052feb69cdce1d5c80e25af6b987121fb5c0002b269f1ad1b38b7b7b40a31ff978457abda68129bacf32ede7fad6abb56d4bfa0c6
-
Filesize
63KB
MD5bd1ebf18f7f0ef1c309617f672ab8335
SHA1739c9c16b2bb153ae5138a7318a58ad8ea261be1
SHA256984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781
SHA5125d27761802e455490f03d6d052feb69cdce1d5c80e25af6b987121fb5c0002b269f1ad1b38b7b7b40a31ff978457abda68129bacf32ede7fad6abb56d4bfa0c6
-
Filesize
63KB
MD5bd1ebf18f7f0ef1c309617f672ab8335
SHA1739c9c16b2bb153ae5138a7318a58ad8ea261be1
SHA256984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781
SHA5125d27761802e455490f03d6d052feb69cdce1d5c80e25af6b987121fb5c0002b269f1ad1b38b7b7b40a31ff978457abda68129bacf32ede7fad6abb56d4bfa0c6
-
Filesize
63KB
MD5bd1ebf18f7f0ef1c309617f672ab8335
SHA1739c9c16b2bb153ae5138a7318a58ad8ea261be1
SHA256984ae1615eeca88944358dad0c893f955298fe901a93417d422f1f97067c2781
SHA5125d27761802e455490f03d6d052feb69cdce1d5c80e25af6b987121fb5c0002b269f1ad1b38b7b7b40a31ff978457abda68129bacf32ede7fad6abb56d4bfa0c6
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606