Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/12/2022, 12:28
Static task
static1
Behavioral task
behavioral1
Sample
71fa869efa924ab2112f97f4eeaee7062bddd34811ea29a8bb406047f08f9fc0.exe
Resource
win10v2004-20220812-en
General
-
Target
71fa869efa924ab2112f97f4eeaee7062bddd34811ea29a8bb406047f08f9fc0.exe
-
Size
227KB
-
MD5
a9f127a12daffee261db244461d88d4d
-
SHA1
87c3daaeb52d3752cfe2490f2bd50fa4aa662c18
-
SHA256
71fa869efa924ab2112f97f4eeaee7062bddd34811ea29a8bb406047f08f9fc0
-
SHA512
d841a8164fed58f455ee035ff88bd42414af7ca1865b9e72ab79601b91d9f9752786020eeaea543dce9048431dd0270dc6ec146121a28f66f163a08b5e7ee522
-
SSDEEP
6144:5GtLRU8PORjhRzo53oTqW85sbqkfeRu4:ItKKgjno53cb68
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/1932-133-0x00000000001F0000-0x00000000001F9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 3 IoCs
flow pid Process 80 1384 rundll32.exe 87 1384 rundll32.exe 120 1384 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 3928 EB6E.exe 5016 3D68.exe 3388 dsvjbcw -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 3D68.exe -
Loads dropped DLL 3 IoCs
pid Process 1384 rundll32.exe 5016 3D68.exe 5016 3D68.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts rundll32.exe -
Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1384 set thread context of 2720 1384 rundll32.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1540 3928 WerFault.exe 87 4136 5016 WerFault.exe 91 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 71fa869efa924ab2112f97f4eeaee7062bddd34811ea29a8bb406047f08f9fc0.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 71fa869efa924ab2112f97f4eeaee7062bddd34811ea29a8bb406047f08f9fc0.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 71fa869efa924ab2112f97f4eeaee7062bddd34811ea29a8bb406047f08f9fc0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dsvjbcw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dsvjbcw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dsvjbcw -
Checks processor information in registry 2 TTPs 26 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3D68.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3D68.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3692 timeout.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Toolbar Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Process not Found Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Process not Found -
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Process not Found Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 820074001c0043465346160031000000000000000000100041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f400009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004100700070004400610074006100000042000000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 50003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Process not Found Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Process not Found Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\WorkFolders Process not Found Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Process not Found Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4e003100000000009555ae6b100054656d7000003a0009000400efbe0c55ec989555ae6b2e00000000000000000000000000000000000000000000000000f88aa700540065006d007000000014000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff Process not Found -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2220 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1932 71fa869efa924ab2112f97f4eeaee7062bddd34811ea29a8bb406047f08f9fc0.exe 1932 71fa869efa924ab2112f97f4eeaee7062bddd34811ea29a8bb406047f08f9fc0.exe 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2220 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1932 71fa869efa924ab2112f97f4eeaee7062bddd34811ea29a8bb406047f08f9fc0.exe 3388 dsvjbcw -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeShutdownPrivilege 2220 Process not Found Token: SeCreatePagefilePrivilege 2220 Process not Found Token: SeDebugPrivilege 1384 rundll32.exe Token: SeShutdownPrivilege 2220 Process not Found Token: SeCreatePagefilePrivilege 2220 Process not Found Token: SeShutdownPrivilege 2220 Process not Found Token: SeCreatePagefilePrivilege 2220 Process not Found Token: SeShutdownPrivilege 2220 Process not Found Token: SeCreatePagefilePrivilege 2220 Process not Found Token: SeShutdownPrivilege 2220 Process not Found Token: SeCreatePagefilePrivilege 2220 Process not Found Token: SeShutdownPrivilege 2220 Process not Found Token: SeCreatePagefilePrivilege 2220 Process not Found Token: SeShutdownPrivilege 2220 Process not Found Token: SeCreatePagefilePrivilege 2220 Process not Found Token: SeShutdownPrivilege 2220 Process not Found Token: SeCreatePagefilePrivilege 2220 Process not Found Token: SeShutdownPrivilege 2220 Process not Found Token: SeCreatePagefilePrivilege 2220 Process not Found Token: SeShutdownPrivilege 2220 Process not Found Token: SeCreatePagefilePrivilege 2220 Process not Found Token: SeShutdownPrivilege 2220 Process not Found Token: SeCreatePagefilePrivilege 2220 Process not Found Token: SeShutdownPrivilege 2220 Process not Found Token: SeCreatePagefilePrivilege 2220 Process not Found Token: SeShutdownPrivilege 2220 Process not Found Token: SeCreatePagefilePrivilege 2220 Process not Found Token: SeShutdownPrivilege 2220 Process not Found Token: SeCreatePagefilePrivilege 2220 Process not Found Token: SeShutdownPrivilege 2220 Process not Found Token: SeCreatePagefilePrivilege 2220 Process not Found Token: SeShutdownPrivilege 2220 Process not Found Token: SeCreatePagefilePrivilege 2220 Process not Found -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 1384 rundll32.exe 2720 rundll32.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2220 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2220 Process not Found 2220 Process not Found -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2220 wrote to memory of 3928 2220 Process not Found 87 PID 2220 wrote to memory of 3928 2220 Process not Found 87 PID 2220 wrote to memory of 3928 2220 Process not Found 87 PID 3928 wrote to memory of 1384 3928 EB6E.exe 88 PID 3928 wrote to memory of 1384 3928 EB6E.exe 88 PID 3928 wrote to memory of 1384 3928 EB6E.exe 88 PID 2220 wrote to memory of 5016 2220 Process not Found 91 PID 2220 wrote to memory of 5016 2220 Process not Found 91 PID 2220 wrote to memory of 5016 2220 Process not Found 91 PID 1384 wrote to memory of 2720 1384 rundll32.exe 92 PID 1384 wrote to memory of 2720 1384 rundll32.exe 92 PID 1384 wrote to memory of 2720 1384 rundll32.exe 92 PID 1384 wrote to memory of 928 1384 rundll32.exe 93 PID 1384 wrote to memory of 928 1384 rundll32.exe 93 PID 1384 wrote to memory of 928 1384 rundll32.exe 93 PID 1384 wrote to memory of 3524 1384 rundll32.exe 95 PID 1384 wrote to memory of 3524 1384 rundll32.exe 95 PID 1384 wrote to memory of 3524 1384 rundll32.exe 95 PID 5016 wrote to memory of 396 5016 3D68.exe 98 PID 5016 wrote to memory of 396 5016 3D68.exe 98 PID 5016 wrote to memory of 396 5016 3D68.exe 98 PID 396 wrote to memory of 3692 396 cmd.exe 102 PID 396 wrote to memory of 3692 396 cmd.exe 102 PID 396 wrote to memory of 3692 396 cmd.exe 102 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\71fa869efa924ab2112f97f4eeaee7062bddd34811ea29a8bb406047f08f9fc0.exe"C:\Users\Admin\AppData\Local\Temp\71fa869efa924ab2112f97f4eeaee7062bddd34811ea29a8bb406047f08f9fc0.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1932
-
C:\Users\Admin\AppData\Local\Temp\EB6E.exeC:\Users\Admin\AppData\Local\Temp\EB6E.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Quspupodwqfhie.tmp",Ritwuoaoyiy2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1384 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 189163⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:2720
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵PID:928
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵PID:3524
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 5282⤵
- Program crash
PID:1540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3928 -ip 39281⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\3D68.exeC:\Users\Admin\AppData\Local\Temp\3D68.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\3D68.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:3692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 19922⤵
- Program crash
PID:4136
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5016 -ip 50161⤵PID:3828
-
C:\Users\Admin\AppData\Roaming\dsvjbcwC:\Users\Admin\AppData\Roaming\dsvjbcw1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3388
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD58f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
Filesize
1.2MB
MD5bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
Filesize
345KB
MD589337ce7760628d22c0852a4e8a4ec3c
SHA1f8a3de35622cef7badd7b7d8eed15d1efe533c03
SHA256f4903708e3119ee5614cdff2071f645a3e1be93826b7e45f7302854c1e925ced
SHA51210d8e9a5537c63ebda34f4966ea814c6996d1b2af5ea09131c570ab185e51e605e667f3e98614616661657864a3699facba9931040e77847e420446f622b2a08
-
Filesize
345KB
MD589337ce7760628d22c0852a4e8a4ec3c
SHA1f8a3de35622cef7badd7b7d8eed15d1efe533c03
SHA256f4903708e3119ee5614cdff2071f645a3e1be93826b7e45f7302854c1e925ced
SHA51210d8e9a5537c63ebda34f4966ea814c6996d1b2af5ea09131c570ab185e51e605e667f3e98614616661657864a3699facba9931040e77847e420446f622b2a08
-
Filesize
1.1MB
MD54d222d2ee00721bdf84d257393121cc8
SHA1f70941425a42c8234e6abee56bee71b6b9446cf3
SHA256bbe6ffbc1d76127fbc55dcaac50f78602d49037157253c772da036878b5a597d
SHA512d704eb36d4ebf6989e3b2b617f28ad473a444682d27e92177d0cc4843031e0ecd32a3948f6b48e211c31ca9020cb3725c3ff994a460fda72667eb91bf557ead7
-
Filesize
1.1MB
MD54d222d2ee00721bdf84d257393121cc8
SHA1f70941425a42c8234e6abee56bee71b6b9446cf3
SHA256bbe6ffbc1d76127fbc55dcaac50f78602d49037157253c772da036878b5a597d
SHA512d704eb36d4ebf6989e3b2b617f28ad473a444682d27e92177d0cc4843031e0ecd32a3948f6b48e211c31ca9020cb3725c3ff994a460fda72667eb91bf557ead7
-
Filesize
814KB
MD5f93876956e6e2f754c8be97ac269729d
SHA1bf0eb05f31b4177e5e2fdeb203698d5018c8ee12
SHA256226eac6b8ce415bf0900050818f8212129fc51d14dab026e7b8600aa89d65c8a
SHA512c3c53aca227ac035ac838002c8f68b2d449ac983a85780356eb8ef7791171fdb2133cf7f8b694cd4e62b6239b5b8ca21013c483c797153dcd57ea845d4b458cb
-
Filesize
814KB
MD5f93876956e6e2f754c8be97ac269729d
SHA1bf0eb05f31b4177e5e2fdeb203698d5018c8ee12
SHA256226eac6b8ce415bf0900050818f8212129fc51d14dab026e7b8600aa89d65c8a
SHA512c3c53aca227ac035ac838002c8f68b2d449ac983a85780356eb8ef7791171fdb2133cf7f8b694cd4e62b6239b5b8ca21013c483c797153dcd57ea845d4b458cb
-
Filesize
227KB
MD5a9f127a12daffee261db244461d88d4d
SHA187c3daaeb52d3752cfe2490f2bd50fa4aa662c18
SHA25671fa869efa924ab2112f97f4eeaee7062bddd34811ea29a8bb406047f08f9fc0
SHA512d841a8164fed58f455ee035ff88bd42414af7ca1865b9e72ab79601b91d9f9752786020eeaea543dce9048431dd0270dc6ec146121a28f66f163a08b5e7ee522
-
Filesize
227KB
MD5a9f127a12daffee261db244461d88d4d
SHA187c3daaeb52d3752cfe2490f2bd50fa4aa662c18
SHA25671fa869efa924ab2112f97f4eeaee7062bddd34811ea29a8bb406047f08f9fc0
SHA512d841a8164fed58f455ee035ff88bd42414af7ca1865b9e72ab79601b91d9f9752786020eeaea543dce9048431dd0270dc6ec146121a28f66f163a08b5e7ee522