Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
339s -
max time network
372s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe
Resource
win10v2004-20221111-en
General
-
Target
59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe
-
Size
72KB
-
MD5
b14872d43b000e051aadd611182dd8ac
-
SHA1
bf7e17d44c99095df4748edb734286f83482b61e
-
SHA256
59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447
-
SHA512
dba272682dbe8e33dce635fdc432f57a3efed03262f0bd28ddeeafae36da1d1f16f7aea2aa4f4d2bf563fe18224ce6b5d9ddfd291f9b6cff7a68f48a6ba9cc4f
-
SSDEEP
384:N6wayA+1mwnA353BXR+oGfPmfm4MlcTGXdhjwroyY2rebV5O6KgxWb/83BXR+oG4:NpQNwC3BESe4Vqth+0V5vKlE3BEJwRrV
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 17 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Executes dropped EXE 20 IoCs
pid Process 1536 backup.exe 2188 backup.exe 1888 backup.exe 3508 backup.exe 2892 backup.exe 916 update.exe 3728 backup.exe 4688 backup.exe 384 update.exe 4716 backup.exe 4348 backup.exe 2608 System Restore.exe 3596 backup.exe 4024 backup.exe 3744 backup.exe 4832 backup.exe 2420 backup.exe 1856 backup.exe 1264 backup.exe 1424 backup.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe System Restore.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\DESIGNER\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5072 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 5072 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe 1536 backup.exe 2188 backup.exe 1888 backup.exe 3508 backup.exe 2892 backup.exe 916 update.exe 3728 backup.exe 4688 backup.exe 384 update.exe 4716 backup.exe 4348 backup.exe 2608 System Restore.exe 3596 backup.exe 4024 backup.exe 3744 backup.exe 4832 backup.exe 2420 backup.exe 1856 backup.exe 1264 backup.exe 1424 backup.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 5072 wrote to memory of 1536 5072 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe 84 PID 5072 wrote to memory of 1536 5072 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe 84 PID 5072 wrote to memory of 1536 5072 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe 84 PID 5072 wrote to memory of 2188 5072 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe 85 PID 5072 wrote to memory of 2188 5072 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe 85 PID 5072 wrote to memory of 2188 5072 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe 85 PID 5072 wrote to memory of 1888 5072 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe 86 PID 5072 wrote to memory of 1888 5072 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe 86 PID 5072 wrote to memory of 1888 5072 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe 86 PID 5072 wrote to memory of 3508 5072 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe 87 PID 5072 wrote to memory of 3508 5072 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe 87 PID 5072 wrote to memory of 3508 5072 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe 87 PID 5072 wrote to memory of 2892 5072 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe 88 PID 5072 wrote to memory of 2892 5072 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe 88 PID 5072 wrote to memory of 2892 5072 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe 88 PID 5072 wrote to memory of 916 5072 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe 89 PID 5072 wrote to memory of 916 5072 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe 89 PID 5072 wrote to memory of 916 5072 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe 89 PID 5072 wrote to memory of 3728 5072 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe 90 PID 5072 wrote to memory of 3728 5072 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe 90 PID 5072 wrote to memory of 3728 5072 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe 90 PID 1536 wrote to memory of 4688 1536 backup.exe 91 PID 1536 wrote to memory of 4688 1536 backup.exe 91 PID 1536 wrote to memory of 4688 1536 backup.exe 91 PID 4688 wrote to memory of 384 4688 backup.exe 92 PID 4688 wrote to memory of 384 4688 backup.exe 92 PID 4688 wrote to memory of 384 4688 backup.exe 92 PID 4688 wrote to memory of 4716 4688 backup.exe 93 PID 4688 wrote to memory of 4716 4688 backup.exe 93 PID 4688 wrote to memory of 4716 4688 backup.exe 93 PID 4688 wrote to memory of 4348 4688 backup.exe 94 PID 4688 wrote to memory of 4348 4688 backup.exe 94 PID 4688 wrote to memory of 4348 4688 backup.exe 94 PID 4688 wrote to memory of 2608 4688 backup.exe 95 PID 4688 wrote to memory of 2608 4688 backup.exe 95 PID 4688 wrote to memory of 2608 4688 backup.exe 95 PID 4348 wrote to memory of 3596 4348 backup.exe 96 PID 4348 wrote to memory of 3596 4348 backup.exe 96 PID 4348 wrote to memory of 3596 4348 backup.exe 96 PID 2608 wrote to memory of 4024 2608 System Restore.exe 97 PID 2608 wrote to memory of 4024 2608 System Restore.exe 97 PID 2608 wrote to memory of 4024 2608 System Restore.exe 97 PID 3596 wrote to memory of 3744 3596 backup.exe 98 PID 3596 wrote to memory of 3744 3596 backup.exe 98 PID 3596 wrote to memory of 3744 3596 backup.exe 98 PID 4024 wrote to memory of 4832 4024 backup.exe 99 PID 4024 wrote to memory of 4832 4024 backup.exe 99 PID 4024 wrote to memory of 4832 4024 backup.exe 99 PID 4832 wrote to memory of 2420 4832 backup.exe 100 PID 4832 wrote to memory of 2420 4832 backup.exe 100 PID 4832 wrote to memory of 2420 4832 backup.exe 100 PID 4348 wrote to memory of 1856 4348 backup.exe 101 PID 4348 wrote to memory of 1856 4348 backup.exe 101 PID 4348 wrote to memory of 1856 4348 backup.exe 101 PID 4832 wrote to memory of 1264 4832 backup.exe 102 PID 4832 wrote to memory of 1264 4832 backup.exe 102 PID 4832 wrote to memory of 1264 4832 backup.exe 102 PID 1856 wrote to memory of 1424 1856 backup.exe 103 PID 1856 wrote to memory of 1424 1856 backup.exe 103 PID 1856 wrote to memory of 1424 1856 backup.exe 103 -
System policy modification 1 TTPs 34 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe"C:\Users\Admin\AppData\Local\Temp\59e2621a2b0e2c04a287fc688df3f9d92ae54a2f803ea34819dc5655e14a1447.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\3268264419\backup.exeC:\Users\Admin\AppData\Local\Temp\3268264419\backup.exe C:\Users\Admin\AppData\Local\Temp\3268264419\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1536 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4688 -
C:\odt\update.exeC:\odt\update.exe C:\odt\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:384
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4716
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4348 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3596 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3744
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1856 -
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1424
-
-
-
-
C:\Program Files (x86)\System Restore.exe"C:\Program Files (x86)\System Restore.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2608 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4024 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4832 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2420
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1264
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1888
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3508
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\update.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\update.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:916
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3728
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5dae25c372fe707b03f1eb60a5829b7ce
SHA187e9064d11e33c115746f2f59821e171b88d8a9a
SHA2560622700c64d81007797ccb06c129c4b65d4b337e1036ea35491673ff6b39ef3c
SHA51265901a9944137094bd9c25d1961bf5ab7add4a8051da0ddeefc462ec9d29456f5cf3ddd639662d8dabc5d3053def0c83c3e627d801d450228aebd76180abf54a
-
Filesize
72KB
MD5dae25c372fe707b03f1eb60a5829b7ce
SHA187e9064d11e33c115746f2f59821e171b88d8a9a
SHA2560622700c64d81007797ccb06c129c4b65d4b337e1036ea35491673ff6b39ef3c
SHA51265901a9944137094bd9c25d1961bf5ab7add4a8051da0ddeefc462ec9d29456f5cf3ddd639662d8dabc5d3053def0c83c3e627d801d450228aebd76180abf54a
-
Filesize
72KB
MD567042f1d7269df3483f2723124df36e6
SHA1472bd75a8cd474802c3c8cb4fe436e7e9a834c3c
SHA2569ada4b509a9d01391e0f5af70eaba37db276c0e283b5cb7aaac8535c4cebcac2
SHA512b9aae75d3bcc0e326aed5373434580885d6a035e6a77ef942b8f0369b4d59ce4caf27c356494d897c92334ec7943771b265cab932e582d738db0bf25ae4123aa
-
Filesize
72KB
MD567042f1d7269df3483f2723124df36e6
SHA1472bd75a8cd474802c3c8cb4fe436e7e9a834c3c
SHA2569ada4b509a9d01391e0f5af70eaba37db276c0e283b5cb7aaac8535c4cebcac2
SHA512b9aae75d3bcc0e326aed5373434580885d6a035e6a77ef942b8f0369b4d59ce4caf27c356494d897c92334ec7943771b265cab932e582d738db0bf25ae4123aa
-
Filesize
72KB
MD59b7994d8cf7d8623c9f781ac9785fb58
SHA15ad2c0fa455a8cba588aaf2428098a7b8c208a28
SHA2560c0b3cf4df769b08db72827f8ca13b24db30712be1713e6ee6aa9a62cccecf61
SHA5123802c77f253332b469d943d9124b3c4858ccafe4dce2a81c28faf26452d21ccefcba20b941af71ea55d45c81e5c25a7bbb34209d1f29b79ddb39d7cc156a9f9e
-
Filesize
72KB
MD59b7994d8cf7d8623c9f781ac9785fb58
SHA15ad2c0fa455a8cba588aaf2428098a7b8c208a28
SHA2560c0b3cf4df769b08db72827f8ca13b24db30712be1713e6ee6aa9a62cccecf61
SHA5123802c77f253332b469d943d9124b3c4858ccafe4dce2a81c28faf26452d21ccefcba20b941af71ea55d45c81e5c25a7bbb34209d1f29b79ddb39d7cc156a9f9e
-
Filesize
72KB
MD52472b315e47b2c63bac24155b42e2885
SHA10702145f5e6a8b0bca6b7940c671b61bbbace24a
SHA256d7b61a11f8c11a086a76b3d43dc013d21f35d8d5ffca7fd72a0624f2e229072d
SHA51295a43bd2639ca5cc4a7f65ba81bf78a426c8253b82141cabe383cc69c46955b1f6e85b13c98a2e24880b896c0f6edf3f183f3bba356e0347b68e5855fcf977e0
-
Filesize
72KB
MD52472b315e47b2c63bac24155b42e2885
SHA10702145f5e6a8b0bca6b7940c671b61bbbace24a
SHA256d7b61a11f8c11a086a76b3d43dc013d21f35d8d5ffca7fd72a0624f2e229072d
SHA51295a43bd2639ca5cc4a7f65ba81bf78a426c8253b82141cabe383cc69c46955b1f6e85b13c98a2e24880b896c0f6edf3f183f3bba356e0347b68e5855fcf977e0
-
Filesize
72KB
MD573fcea08df566b204b9f36f9a8626425
SHA1b898cb82078563752c2649108f419a1a5c7abeba
SHA256a8736cf40808070f28a968bcdcbf57ea0c139e357b3db4d421cfd04ce87c1420
SHA5122009cf1ecc1dc7f3e5f71c7eb078d578ccf33aeb96913d51cc2d8d1ca690d6b8c406ef37006ade7f1f1dad08fc6cb57e04c2b0a6c1481eabf341e8789a040904
-
Filesize
72KB
MD573fcea08df566b204b9f36f9a8626425
SHA1b898cb82078563752c2649108f419a1a5c7abeba
SHA256a8736cf40808070f28a968bcdcbf57ea0c139e357b3db4d421cfd04ce87c1420
SHA5122009cf1ecc1dc7f3e5f71c7eb078d578ccf33aeb96913d51cc2d8d1ca690d6b8c406ef37006ade7f1f1dad08fc6cb57e04c2b0a6c1481eabf341e8789a040904
-
Filesize
72KB
MD54d9d82af6efcaf80f1bb2270ef3519c6
SHA15ae9e3c883fa53f31e29c751e1f80c08c9b52667
SHA256035df66cb8e651b869a41b85ed04bcfa73edbf57c69c2dbdd1ba03a560701aa3
SHA5127e2505fe95da4fe3f5eef3f2fc3feddc8c83b9452f6797d2857e02743f6c506cbedc83b97a21fef8683f705a67a6b979f2234e33f3303e6ae80faf3688094296
-
Filesize
72KB
MD54d9d82af6efcaf80f1bb2270ef3519c6
SHA15ae9e3c883fa53f31e29c751e1f80c08c9b52667
SHA256035df66cb8e651b869a41b85ed04bcfa73edbf57c69c2dbdd1ba03a560701aa3
SHA5127e2505fe95da4fe3f5eef3f2fc3feddc8c83b9452f6797d2857e02743f6c506cbedc83b97a21fef8683f705a67a6b979f2234e33f3303e6ae80faf3688094296
-
Filesize
72KB
MD56e685f6fbba248a3f843b23bb01d3eef
SHA1ad28512c80d05bbbc4cca4ba30ff9a828d75a6a7
SHA25654d9b964d7ff62e23bfc5526bc2e82b6f6428ce83b7863e355c4c5c28eec32cf
SHA512b1f69beba4dc1b3ce52e86a2ddab8c8dca4ae3d3e821d218333181fa5e3e81ddb30bf3813ded43a4d44d16009b2d7cc42f357b510de5162d714844682e71236d
-
Filesize
72KB
MD56e685f6fbba248a3f843b23bb01d3eef
SHA1ad28512c80d05bbbc4cca4ba30ff9a828d75a6a7
SHA25654d9b964d7ff62e23bfc5526bc2e82b6f6428ce83b7863e355c4c5c28eec32cf
SHA512b1f69beba4dc1b3ce52e86a2ddab8c8dca4ae3d3e821d218333181fa5e3e81ddb30bf3813ded43a4d44d16009b2d7cc42f357b510de5162d714844682e71236d
-
Filesize
72KB
MD5a467276907576d484502d88370047a49
SHA1ffbb87019b6fb079b3fb0d302e38d13dfcd9aa73
SHA25616de5f77b0e02ce27adf8579a1f72a248aa0e3108777533a9e329aff0fadc472
SHA51260ea18f20227b005624127da5c3c528c26a4896767bf98bc9c5ab31e5dcec7a0cf7e257f76bae2df37ec626b23777206a8b8e7b5963e36f74dbcfe8b2555d62b
-
Filesize
72KB
MD5a467276907576d484502d88370047a49
SHA1ffbb87019b6fb079b3fb0d302e38d13dfcd9aa73
SHA25616de5f77b0e02ce27adf8579a1f72a248aa0e3108777533a9e329aff0fadc472
SHA51260ea18f20227b005624127da5c3c528c26a4896767bf98bc9c5ab31e5dcec7a0cf7e257f76bae2df37ec626b23777206a8b8e7b5963e36f74dbcfe8b2555d62b
-
Filesize
72KB
MD5980454f89c6f6da73ee067a4891464d0
SHA16827b0a42ff49f5d559f83a3c716102b7e519074
SHA256eed5524973a768423b7fa33b871d182884e470772a8f9f65d4af2ad6e57619a1
SHA512b0ba5da90618ac70a9b48a1a3c915733082e4a16ff6388d1e5aad45c231ea66d426480d2e928efa98fc8ff0195d6bd4ae2f98424f80baa9c1d528789e708fa24
-
Filesize
72KB
MD5980454f89c6f6da73ee067a4891464d0
SHA16827b0a42ff49f5d559f83a3c716102b7e519074
SHA256eed5524973a768423b7fa33b871d182884e470772a8f9f65d4af2ad6e57619a1
SHA512b0ba5da90618ac70a9b48a1a3c915733082e4a16ff6388d1e5aad45c231ea66d426480d2e928efa98fc8ff0195d6bd4ae2f98424f80baa9c1d528789e708fa24
-
Filesize
72KB
MD59f25ef7f981f53068e13b3dc00471ca1
SHA1cfef12977e8d98abf00a87ea1d4d5c2345d85e52
SHA256ee18b131052e87701dbfb3b57d6b2a05813991df466b8deff58f4aa57ebba8d3
SHA51242cb06b041fe04af224672a2ec24a2358d7111e828fe463fe3f4626a8b1b3a13d6210b1ef104f789bb2499fd95698f6ad96d553f145bae4ffef514860cb31df3
-
Filesize
72KB
MD59f25ef7f981f53068e13b3dc00471ca1
SHA1cfef12977e8d98abf00a87ea1d4d5c2345d85e52
SHA256ee18b131052e87701dbfb3b57d6b2a05813991df466b8deff58f4aa57ebba8d3
SHA51242cb06b041fe04af224672a2ec24a2358d7111e828fe463fe3f4626a8b1b3a13d6210b1ef104f789bb2499fd95698f6ad96d553f145bae4ffef514860cb31df3
-
Filesize
72KB
MD589b83e966e1fb976e50ad4eb66054acd
SHA17f2fb6e52d30eea15c49bdfc043e1bd1d86ef005
SHA256742535a4d1433f175077fcb656ee2fe52ae7d5d66f1d9142ea5adbb5a39d5c84
SHA5129bf69c83aaa588e3199aff24c5efc7137be70f956f95e0bcb401dc62139f07e7a14918e467b06a5ebd3570b9be87d82e615c753209cdf3c20464e497002bd9b7
-
Filesize
72KB
MD589b83e966e1fb976e50ad4eb66054acd
SHA17f2fb6e52d30eea15c49bdfc043e1bd1d86ef005
SHA256742535a4d1433f175077fcb656ee2fe52ae7d5d66f1d9142ea5adbb5a39d5c84
SHA5129bf69c83aaa588e3199aff24c5efc7137be70f956f95e0bcb401dc62139f07e7a14918e467b06a5ebd3570b9be87d82e615c753209cdf3c20464e497002bd9b7
-
Filesize
72KB
MD5ae4b686e661c7b80229e40170f50739d
SHA1661182acc71ee4063bb0fec0f36822dcb128c469
SHA256bc1ab298a6e60ff04d251278cb3bb4b648e07b6fcfbefd2406dc6f5bd77e0f6d
SHA512ab5389e75a384c25038b50c03866fed81645dafd25c978e0f06763749dcfb34fadaf8fecccd4e28321ba0f9b3a35ea8d4fe0284b8b88d0040cd6576f931722ee
-
Filesize
72KB
MD5ae4b686e661c7b80229e40170f50739d
SHA1661182acc71ee4063bb0fec0f36822dcb128c469
SHA256bc1ab298a6e60ff04d251278cb3bb4b648e07b6fcfbefd2406dc6f5bd77e0f6d
SHA512ab5389e75a384c25038b50c03866fed81645dafd25c978e0f06763749dcfb34fadaf8fecccd4e28321ba0f9b3a35ea8d4fe0284b8b88d0040cd6576f931722ee
-
Filesize
72KB
MD5e6d9832355ae53fca704399f1741d8da
SHA1731a80a5470121c63219b7574d15f17ccdb449fc
SHA256fe254169c50adefcf39807c1ac6c8f23d61c2093ec6615031a1ff665c9fa5515
SHA512958c1f31bd05c4ee555b530d211a8b980456b03f7ad11526b5e036f5b0327c19c543661d27abae60b33bd38ff53039987f9fbb4fa6a02b71bfda1cbbb0b3339f
-
Filesize
72KB
MD5e6d9832355ae53fca704399f1741d8da
SHA1731a80a5470121c63219b7574d15f17ccdb449fc
SHA256fe254169c50adefcf39807c1ac6c8f23d61c2093ec6615031a1ff665c9fa5515
SHA512958c1f31bd05c4ee555b530d211a8b980456b03f7ad11526b5e036f5b0327c19c543661d27abae60b33bd38ff53039987f9fbb4fa6a02b71bfda1cbbb0b3339f
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5e6d9832355ae53fca704399f1741d8da
SHA1731a80a5470121c63219b7574d15f17ccdb449fc
SHA256fe254169c50adefcf39807c1ac6c8f23d61c2093ec6615031a1ff665c9fa5515
SHA512958c1f31bd05c4ee555b530d211a8b980456b03f7ad11526b5e036f5b0327c19c543661d27abae60b33bd38ff53039987f9fbb4fa6a02b71bfda1cbbb0b3339f
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5e6d9832355ae53fca704399f1741d8da
SHA1731a80a5470121c63219b7574d15f17ccdb449fc
SHA256fe254169c50adefcf39807c1ac6c8f23d61c2093ec6615031a1ff665c9fa5515
SHA512958c1f31bd05c4ee555b530d211a8b980456b03f7ad11526b5e036f5b0327c19c543661d27abae60b33bd38ff53039987f9fbb4fa6a02b71bfda1cbbb0b3339f
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\update.exe
Filesize72KB
MD5e6d9832355ae53fca704399f1741d8da
SHA1731a80a5470121c63219b7574d15f17ccdb449fc
SHA256fe254169c50adefcf39807c1ac6c8f23d61c2093ec6615031a1ff665c9fa5515
SHA512958c1f31bd05c4ee555b530d211a8b980456b03f7ad11526b5e036f5b0327c19c543661d27abae60b33bd38ff53039987f9fbb4fa6a02b71bfda1cbbb0b3339f
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\update.exe
Filesize72KB
MD5e6d9832355ae53fca704399f1741d8da
SHA1731a80a5470121c63219b7574d15f17ccdb449fc
SHA256fe254169c50adefcf39807c1ac6c8f23d61c2093ec6615031a1ff665c9fa5515
SHA512958c1f31bd05c4ee555b530d211a8b980456b03f7ad11526b5e036f5b0327c19c543661d27abae60b33bd38ff53039987f9fbb4fa6a02b71bfda1cbbb0b3339f
-
Filesize
72KB
MD5ae4b686e661c7b80229e40170f50739d
SHA1661182acc71ee4063bb0fec0f36822dcb128c469
SHA256bc1ab298a6e60ff04d251278cb3bb4b648e07b6fcfbefd2406dc6f5bd77e0f6d
SHA512ab5389e75a384c25038b50c03866fed81645dafd25c978e0f06763749dcfb34fadaf8fecccd4e28321ba0f9b3a35ea8d4fe0284b8b88d0040cd6576f931722ee
-
Filesize
72KB
MD5ae4b686e661c7b80229e40170f50739d
SHA1661182acc71ee4063bb0fec0f36822dcb128c469
SHA256bc1ab298a6e60ff04d251278cb3bb4b648e07b6fcfbefd2406dc6f5bd77e0f6d
SHA512ab5389e75a384c25038b50c03866fed81645dafd25c978e0f06763749dcfb34fadaf8fecccd4e28321ba0f9b3a35ea8d4fe0284b8b88d0040cd6576f931722ee
-
Filesize
72KB
MD5ae4b686e661c7b80229e40170f50739d
SHA1661182acc71ee4063bb0fec0f36822dcb128c469
SHA256bc1ab298a6e60ff04d251278cb3bb4b648e07b6fcfbefd2406dc6f5bd77e0f6d
SHA512ab5389e75a384c25038b50c03866fed81645dafd25c978e0f06763749dcfb34fadaf8fecccd4e28321ba0f9b3a35ea8d4fe0284b8b88d0040cd6576f931722ee
-
Filesize
72KB
MD5ae4b686e661c7b80229e40170f50739d
SHA1661182acc71ee4063bb0fec0f36822dcb128c469
SHA256bc1ab298a6e60ff04d251278cb3bb4b648e07b6fcfbefd2406dc6f5bd77e0f6d
SHA512ab5389e75a384c25038b50c03866fed81645dafd25c978e0f06763749dcfb34fadaf8fecccd4e28321ba0f9b3a35ea8d4fe0284b8b88d0040cd6576f931722ee
-
Filesize
72KB
MD58068145bfd562d2212737b35bee4a026
SHA1981a17e79cf06dd4a899b36ed74752dfbcffd887
SHA2560376485908fd27911a9c185ce98f5700321281995cf174d569fd5947caf2a614
SHA5123082228b292efe53958e4033e5df862d501e0145fef0f2ad36d7261d962c0176fa4a55236248c3b1d497a3d784b71e143dd83a0d7c84f7da9c41b397109f801c
-
Filesize
72KB
MD58068145bfd562d2212737b35bee4a026
SHA1981a17e79cf06dd4a899b36ed74752dfbcffd887
SHA2560376485908fd27911a9c185ce98f5700321281995cf174d569fd5947caf2a614
SHA5123082228b292efe53958e4033e5df862d501e0145fef0f2ad36d7261d962c0176fa4a55236248c3b1d497a3d784b71e143dd83a0d7c84f7da9c41b397109f801c
-
Filesize
72KB
MD5a168952a93c8b590da1b8ee0bd7f41d7
SHA1a8f443a87f5ae8dec6dff3b5d75d9775a400d153
SHA256d1948a91b884de0f2d07de9ca1501ae263f04bfe95736e1c216f4fa402b802b1
SHA512334230e5dfb6ebc1358968c55e7459224e581ca09405aef7cbacd741b2e006cb7ebe53d06d06879dc0228ef65ad720cd5f0d3aa3614c640724aed5e0174ec688
-
Filesize
72KB
MD5a168952a93c8b590da1b8ee0bd7f41d7
SHA1a8f443a87f5ae8dec6dff3b5d75d9775a400d153
SHA256d1948a91b884de0f2d07de9ca1501ae263f04bfe95736e1c216f4fa402b802b1
SHA512334230e5dfb6ebc1358968c55e7459224e581ca09405aef7cbacd741b2e006cb7ebe53d06d06879dc0228ef65ad720cd5f0d3aa3614c640724aed5e0174ec688
-
Filesize
72KB
MD5961a02496c93f8a766faa64cf36045b3
SHA1d296dab29e83097dd84458edc6ccc1095816ff88
SHA25681876fd90dfe48abc2e2a275209c1a76ccf7c19a64c43acb154c5efa9db1572e
SHA51286544c5be957a9c654c89da71dc9dec1ec9c2880be15118043092aabe229dd1856fa0c5347c88a501616507e06f44d8092f6f61f7afa3e7b5f8304b8ee44703b
-
Filesize
72KB
MD5961a02496c93f8a766faa64cf36045b3
SHA1d296dab29e83097dd84458edc6ccc1095816ff88
SHA25681876fd90dfe48abc2e2a275209c1a76ccf7c19a64c43acb154c5efa9db1572e
SHA51286544c5be957a9c654c89da71dc9dec1ec9c2880be15118043092aabe229dd1856fa0c5347c88a501616507e06f44d8092f6f61f7afa3e7b5f8304b8ee44703b