Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-12-2022 17:01
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
225KB
-
MD5
6a59c469713da7bb9abc4b8f2e8ac6da
-
SHA1
e87a23b50b3f3a41c50d62e558153d3a3010a02b
-
SHA256
3d21285ae1a22e1954c31393ce1a7238054d9a78b5ec7560235261cb99df918d
-
SHA512
16e7c44c8026016439f2c2eac8ae05a7f0ae6115882897d885837a6f5c37c3b19f5cba53202e691a11e632615d921adb50979077d0e50898cce49d2fbe7bca65
-
SSDEEP
3072:Lz08R/4F+88pD4EkNimqFDF6D2lhPBhQuzpw1H4Oc/1dcK4sRPID6bM0mQt0:x4QRnkgZFDFNPouzpw1H4O9NDCP0
Malware Config
Extracted
amadey
3.60
193.42.33.28/game0ver/index.php
Extracted
remcos
12-22-22
194.180.48.225:1024
-
audio_folder
iujhgv
-
audio_path
%Temp%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
lkjhg.exe
-
copy_folder
sdfghjk
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
oijkhb.dat
-
keylog_flag
false
-
keylog_folder
hgfds
-
keylog_path
%WinDir%
-
mouse_option
false
-
mutex
yuhgfd-9Z85LD
-
screenshot_crypt
false
-
screenshot_flag
true
-
screenshot_folder
lkjhg
-
screenshot_path
%AppData%
-
screenshot_time
5
-
startup_value
ijhgf
-
take_screenshot_option
true
-
take_screenshot_time
5
-
take_screenshot_title
bank
Signatures
-
Detect rhadamanthys stealer shellcode 1 IoCs
resource yara_rule behavioral1/memory/1728-631-0x0000000000630000-0x000000000064D000-memory.dmp family_rhadamanthys -
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/1436-4926-0x0000000000400000-0x0000000000529000-memory.dmp unk_chinese_botnet -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bd.exe -
Downloads MZ/PE file
-
Executes dropped EXE 12 IoCs
pid Process 1428 WinComService.exe 1436 system32.exe 1728 bd.exe 692 agent.exe 1968 lkjhg.exe 1580 super9.exe 1496 WinComService.exe 1968 WinComService.exe 1968 computer.exe 1404 ._cache_computer.exe 384 Synaptics.exe 1088 system32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bd.exe -
Loads dropped DLL 15 IoCs
pid Process 1208 file.exe 1428 WinComService.exe 1428 WinComService.exe 1428 WinComService.exe 1428 WinComService.exe 1648 cmd.exe 1648 cmd.exe 1428 WinComService.exe 1436 system32.exe 1436 system32.exe 1968 computer.exe 1968 computer.exe 1968 computer.exe 1968 computer.exe 1968 computer.exe -
Adds Run key to start application 2 TTPs 17 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ agent.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ijhgf = "\"C:\\ProgramData\\sdfghjk\\lkjhg.exe\"" lkjhg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\super9 = "C:\\Users\\Admin\\AppData\\Roaming\\super9.exe" super9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\system32.exe = "C:\\Users\\Admin\\AppData\\Roaming\\1000034050\\system32.exe" WinComService.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ agent.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ijhgf = "\"C:\\ProgramData\\sdfghjk\\lkjhg.exe\"" iexplore.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ijhgf = "\"C:\\ProgramData\\sdfghjk\\lkjhg.exe\"" agent.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ lkjhg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ lkjhg.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ijhgf = "\"C:\\ProgramData\\sdfghjk\\lkjhg.exe\"" agent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ijhgf = "\"C:\\ProgramData\\sdfghjk\\lkjhg.exe\"" lkjhg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\agent.exe = "C:\\Users\\Admin\\AppData\\Roaming\\1000039050\\agent.exe" WinComService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ijhgf = "\"C:\\ProgramData\\sdfghjk\\lkjhg.exe\"" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" computer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bd.exe = "C:\\Users\\Admin\\AppData\\Roaming\\1000038050\\bd.exe" WinComService.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bd.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 bd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\system32.exe system32.exe File opened for modification C:\Windows\SysWOW64\system32.exe system32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 1728 bd.exe 1728 bd.exe 1728 bd.exe 1728 bd.exe 1436 system32.exe 1436 system32.exe 1436 system32.exe 1436 system32.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1968 set thread context of 1636 1968 lkjhg.exe 56 PID 1636 set thread context of 1916 1636 iexplore.exe 58 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\hgfds\oijkhb.dat iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bd.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bd.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 956 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE -
Modifies registry key 1 TTPs 3 IoCs
pid Process 1736 reg.exe 1880 reg.exe 1328 reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1728 bd.exe 1968 lkjhg.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1968 lkjhg.exe 1636 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: 33 1664 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1664 AUDIODG.EXE Token: 33 1664 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1664 AUDIODG.EXE Token: SeDebugPrivilege 1580 super9.exe Token: SeShutdownPrivilege 1728 bd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1636 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1208 wrote to memory of 1428 1208 file.exe 28 PID 1208 wrote to memory of 1428 1208 file.exe 28 PID 1208 wrote to memory of 1428 1208 file.exe 28 PID 1208 wrote to memory of 1428 1208 file.exe 28 PID 1428 wrote to memory of 956 1428 WinComService.exe 29 PID 1428 wrote to memory of 956 1428 WinComService.exe 29 PID 1428 wrote to memory of 956 1428 WinComService.exe 29 PID 1428 wrote to memory of 956 1428 WinComService.exe 29 PID 1428 wrote to memory of 844 1428 WinComService.exe 31 PID 1428 wrote to memory of 844 1428 WinComService.exe 31 PID 1428 wrote to memory of 844 1428 WinComService.exe 31 PID 1428 wrote to memory of 844 1428 WinComService.exe 31 PID 844 wrote to memory of 1088 844 cmd.exe 33 PID 844 wrote to memory of 1088 844 cmd.exe 33 PID 844 wrote to memory of 1088 844 cmd.exe 33 PID 844 wrote to memory of 1088 844 cmd.exe 33 PID 844 wrote to memory of 544 844 cmd.exe 34 PID 844 wrote to memory of 544 844 cmd.exe 34 PID 844 wrote to memory of 544 844 cmd.exe 34 PID 844 wrote to memory of 544 844 cmd.exe 34 PID 844 wrote to memory of 1884 844 cmd.exe 35 PID 844 wrote to memory of 1884 844 cmd.exe 35 PID 844 wrote to memory of 1884 844 cmd.exe 35 PID 844 wrote to memory of 1884 844 cmd.exe 35 PID 844 wrote to memory of 840 844 cmd.exe 36 PID 844 wrote to memory of 840 844 cmd.exe 36 PID 844 wrote to memory of 840 844 cmd.exe 36 PID 844 wrote to memory of 840 844 cmd.exe 36 PID 844 wrote to memory of 1588 844 cmd.exe 37 PID 844 wrote to memory of 1588 844 cmd.exe 37 PID 844 wrote to memory of 1588 844 cmd.exe 37 PID 844 wrote to memory of 1588 844 cmd.exe 37 PID 844 wrote to memory of 1688 844 cmd.exe 38 PID 844 wrote to memory of 1688 844 cmd.exe 38 PID 844 wrote to memory of 1688 844 cmd.exe 38 PID 844 wrote to memory of 1688 844 cmd.exe 38 PID 1428 wrote to memory of 1436 1428 WinComService.exe 41 PID 1428 wrote to memory of 1436 1428 WinComService.exe 41 PID 1428 wrote to memory of 1436 1428 WinComService.exe 41 PID 1428 wrote to memory of 1436 1428 WinComService.exe 41 PID 1428 wrote to memory of 1728 1428 WinComService.exe 42 PID 1428 wrote to memory of 1728 1428 WinComService.exe 42 PID 1428 wrote to memory of 1728 1428 WinComService.exe 42 PID 1428 wrote to memory of 1728 1428 WinComService.exe 42 PID 1428 wrote to memory of 1728 1428 WinComService.exe 42 PID 1428 wrote to memory of 1728 1428 WinComService.exe 42 PID 1428 wrote to memory of 1728 1428 WinComService.exe 42 PID 1428 wrote to memory of 692 1428 WinComService.exe 43 PID 1428 wrote to memory of 692 1428 WinComService.exe 43 PID 1428 wrote to memory of 692 1428 WinComService.exe 43 PID 1428 wrote to memory of 692 1428 WinComService.exe 43 PID 692 wrote to memory of 780 692 agent.exe 44 PID 692 wrote to memory of 780 692 agent.exe 44 PID 692 wrote to memory of 780 692 agent.exe 44 PID 692 wrote to memory of 780 692 agent.exe 44 PID 780 wrote to memory of 1880 780 cmd.exe 46 PID 780 wrote to memory of 1880 780 cmd.exe 46 PID 780 wrote to memory of 1880 780 cmd.exe 46 PID 780 wrote to memory of 1880 780 cmd.exe 46 PID 692 wrote to memory of 1356 692 agent.exe 47 PID 692 wrote to memory of 1356 692 agent.exe 47 PID 692 wrote to memory of 1356 692 agent.exe 47 PID 692 wrote to memory of 1356 692 agent.exe 47 PID 1356 wrote to memory of 1648 1356 WScript.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\a4e2bd6d47\WinComService.exe"C:\Users\Admin\AppData\Local\Temp\a4e2bd6d47\WinComService.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN WinComService.exe /TR "C:\Users\Admin\AppData\Local\Temp\a4e2bd6d47\WinComService.exe" /F3⤵
- Creates scheduled task(s)
PID:956
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "WinComService.exe" /P "Admin:N"&&CACLS "WinComService.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a4e2bd6d47" /P "Admin:N"&&CACLS "..\a4e2bd6d47" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1088
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "WinComService.exe" /P "Admin:N"4⤵PID:544
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "WinComService.exe" /P "Admin:R" /E4⤵PID:1884
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:840
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\a4e2bd6d47" /P "Admin:N"4⤵PID:1588
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\a4e2bd6d47" /P "Admin:R" /E4⤵PID:1688
-
-
-
C:\Users\Admin\AppData\Roaming\1000034050\system32.exe"C:\Users\Admin\AppData\Roaming\1000034050\system32.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c md C:\windowss644⤵PID:1256
-
-
C:\windowss64\computer.exe"C:\windowss64\computer.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe"C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe"5⤵
- Executes dropped EXE
PID:1404
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate5⤵
- Executes dropped EXE
PID:384
-
-
-
-
C:\Users\Admin\AppData\Roaming\1000038050\bd.exe"C:\Users\Admin\AppData\Roaming\1000038050\bd.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
C:\Users\Admin\AppData\Roaming\1000039050\agent.exe"C:\Users\Admin\AppData\Roaming\1000039050\agent.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- UAC bypass
- Modifies registry key
PID:1880
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\coop.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\sdfghjk\lkjhg.exe"5⤵
- Loads dropped DLL
PID:1648 -
C:\ProgramData\sdfghjk\lkjhg.exeC:\ProgramData\sdfghjk\lkjhg.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1968 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f7⤵PID:1172
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f8⤵
- UAC bypass
- Modifies registry key
PID:1328
-
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"7⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:1636 -
C:\Windows\SysWOW64\svchost.exesvchost.exe8⤵PID:1916
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000040001\super9.exe"C:\Users\Admin\AppData\Local\Temp\1000040001\super9.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1580
-
-
-
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f1⤵PID:628
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- UAC bypass
- Modifies registry key
PID:1736
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5681⤵
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
C:\Windows\system32\taskeng.exetaskeng.exe {C11F6701-F172-48EB-A08E-3511352AB2EF} S-1-5-21-3406023954-474543476-3319432036-1000:VUIIVLGQ\Admin:Interactive:[1]1⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\a4e2bd6d47\WinComService.exeC:\Users\Admin\AppData\Local\Temp\a4e2bd6d47\WinComService.exe2⤵
- Executes dropped EXE
PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\a4e2bd6d47\WinComService.exeC:\Users\Admin\AppData\Local\Temp\a4e2bd6d47\WinComService.exe2⤵
- Executes dropped EXE
PID:1968
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- Modifies Internet Explorer settings
PID:1456
-
C:\Windows\SysWOW64\system32.exeC:\Windows\SysWOW64\system32.exe1⤵
- Executes dropped EXE
PID:1088
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
754KB
MD5310a7ff41f6633132e6c2bc25e51e567
SHA15f687df8cc3185ed68d77d0e05502c2eb308c5c8
SHA256d1425edf482717cb64db2a36357866045b0c6306d919296591ffc9bc45d680ab
SHA512ee9b3114cb37e52793bccdf20a27158f5def67ed9c7d8eb772e1deaf5d5f9a0030e847dea40bb320637f29508f1be2a49c3095460a6fd3afbc3bca196f642980
-
Filesize
754KB
MD5310a7ff41f6633132e6c2bc25e51e567
SHA15f687df8cc3185ed68d77d0e05502c2eb308c5c8
SHA256d1425edf482717cb64db2a36357866045b0c6306d919296591ffc9bc45d680ab
SHA512ee9b3114cb37e52793bccdf20a27158f5def67ed9c7d8eb772e1deaf5d5f9a0030e847dea40bb320637f29508f1be2a49c3095460a6fd3afbc3bca196f642980
-
Filesize
471KB
MD5ac382bfcfaea86b5749f7abc571ccf12
SHA1928454bcce909ea349a03b14c043430905a88fdb
SHA256f7f8d1ebfed3afd13eb47392a7f502603ecb970a817c221682cd8f2a17ff2bb3
SHA51207cacc471ac863ac12db6f0d4c7a75d968dea257f7f5f722a830e9b5239f45071e1a3fe19c17faca06aec4a48f8456d3590f8643c618a023838aca46e0c03c4d
-
Filesize
471KB
MD5ac382bfcfaea86b5749f7abc571ccf12
SHA1928454bcce909ea349a03b14c043430905a88fdb
SHA256f7f8d1ebfed3afd13eb47392a7f502603ecb970a817c221682cd8f2a17ff2bb3
SHA51207cacc471ac863ac12db6f0d4c7a75d968dea257f7f5f722a830e9b5239f45071e1a3fe19c17faca06aec4a48f8456d3590f8643c618a023838aca46e0c03c4d
-
Filesize
400KB
MD520beeb0a82adcce3a58372804acc46be
SHA1c579d9017d2c8298fe075ff5c05963901330e72a
SHA256d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e
SHA5127636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd
-
Filesize
400KB
MD520beeb0a82adcce3a58372804acc46be
SHA1c579d9017d2c8298fe075ff5c05963901330e72a
SHA256d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e
SHA5127636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd
-
Filesize
45KB
MD54439bff7fec557da1fb9ed754a838be7
SHA11aac2acba06be9d26209fe5b8b236315a0f8f387
SHA2560283da2469f040a2aadcb65856947035f98dca525639670e658f7bdbe9d4f912
SHA512c277587bb27d13ac18edc1eadf2ba1e1638ba027de7303d45857ece5e3104b4eb9f7f1e67043f02c0a9785893827960e40c35a0661a02d28dfd0d7674db4a243
-
Filesize
45KB
MD54439bff7fec557da1fb9ed754a838be7
SHA11aac2acba06be9d26209fe5b8b236315a0f8f387
SHA2560283da2469f040a2aadcb65856947035f98dca525639670e658f7bdbe9d4f912
SHA512c277587bb27d13ac18edc1eadf2ba1e1638ba027de7303d45857ece5e3104b4eb9f7f1e67043f02c0a9785893827960e40c35a0661a02d28dfd0d7674db4a243
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
225KB
MD56a59c469713da7bb9abc4b8f2e8ac6da
SHA1e87a23b50b3f3a41c50d62e558153d3a3010a02b
SHA2563d21285ae1a22e1954c31393ce1a7238054d9a78b5ec7560235261cb99df918d
SHA51216e7c44c8026016439f2c2eac8ae05a7f0ae6115882897d885837a6f5c37c3b19f5cba53202e691a11e632615d921adb50979077d0e50898cce49d2fbe7bca65
-
Filesize
225KB
MD56a59c469713da7bb9abc4b8f2e8ac6da
SHA1e87a23b50b3f3a41c50d62e558153d3a3010a02b
SHA2563d21285ae1a22e1954c31393ce1a7238054d9a78b5ec7560235261cb99df918d
SHA51216e7c44c8026016439f2c2eac8ae05a7f0ae6115882897d885837a6f5c37c3b19f5cba53202e691a11e632615d921adb50979077d0e50898cce49d2fbe7bca65
-
Filesize
225KB
MD56a59c469713da7bb9abc4b8f2e8ac6da
SHA1e87a23b50b3f3a41c50d62e558153d3a3010a02b
SHA2563d21285ae1a22e1954c31393ce1a7238054d9a78b5ec7560235261cb99df918d
SHA51216e7c44c8026016439f2c2eac8ae05a7f0ae6115882897d885837a6f5c37c3b19f5cba53202e691a11e632615d921adb50979077d0e50898cce49d2fbe7bca65
-
Filesize
225KB
MD56a59c469713da7bb9abc4b8f2e8ac6da
SHA1e87a23b50b3f3a41c50d62e558153d3a3010a02b
SHA2563d21285ae1a22e1954c31393ce1a7238054d9a78b5ec7560235261cb99df918d
SHA51216e7c44c8026016439f2c2eac8ae05a7f0ae6115882897d885837a6f5c37c3b19f5cba53202e691a11e632615d921adb50979077d0e50898cce49d2fbe7bca65
-
Filesize
524B
MD5d28163eaa4337903de41f7bec5b33795
SHA14be22a60548fb9d3bc71dad30825c2dabc0ec815
SHA256186a2649bb67e20bb349177b22e28e5206550d554bc6d58592a0ca69de3d07dd
SHA5129ea9a163dfa7ed26b03928db75f3f9e3da77d087b221bbe640c6497a3f2ed3f15e9ea5a1fd47244afc587bdcd7ff0de153261cc11d5c4c2d6b487c195e7dcce9
-
Filesize
879KB
MD545f6980ec4c0108bb1103cbc1906fa18
SHA126504d9884c97a2fab9aa128148a5b36becf9e92
SHA2568bc19641f9095f8c86c3836cf1f9d7b1dd14a1c62da0320ce09d5e27d0104927
SHA51264fc21f11fc4bfbd485111695ee2ac9e1e70f4107893e259aa4d705a7ad647e7968f3c223d8d647124c8b0d8f041bae074c600a0ae168b0eb166cd62ee877049
-
Filesize
879KB
MD545f6980ec4c0108bb1103cbc1906fa18
SHA126504d9884c97a2fab9aa128148a5b36becf9e92
SHA2568bc19641f9095f8c86c3836cf1f9d7b1dd14a1c62da0320ce09d5e27d0104927
SHA51264fc21f11fc4bfbd485111695ee2ac9e1e70f4107893e259aa4d705a7ad647e7968f3c223d8d647124c8b0d8f041bae074c600a0ae168b0eb166cd62ee877049
-
Filesize
1.4MB
MD5afd26f223230ad20eb208dbaa0164e43
SHA19c92cde80d982dec72e5a2fb6553bc1cd89e8319
SHA256fc0cb0682ccc37bdd72fab5106d45ebf7fb014b15004d65d627f6e2aed0750b4
SHA512e0e284ffdd4ef7421a0c0ffb1cf6e2aa82707a861be84e98713a3efd385f1347d8c869709d941d19c0fb3df0d7e40aec1803fb14cc379cec98eeaf8e196aefce
-
Filesize
471KB
MD5ac382bfcfaea86b5749f7abc571ccf12
SHA1928454bcce909ea349a03b14c043430905a88fdb
SHA256f7f8d1ebfed3afd13eb47392a7f502603ecb970a817c221682cd8f2a17ff2bb3
SHA51207cacc471ac863ac12db6f0d4c7a75d968dea257f7f5f722a830e9b5239f45071e1a3fe19c17faca06aec4a48f8456d3590f8643c618a023838aca46e0c03c4d
-
Filesize
471KB
MD5ac382bfcfaea86b5749f7abc571ccf12
SHA1928454bcce909ea349a03b14c043430905a88fdb
SHA256f7f8d1ebfed3afd13eb47392a7f502603ecb970a817c221682cd8f2a17ff2bb3
SHA51207cacc471ac863ac12db6f0d4c7a75d968dea257f7f5f722a830e9b5239f45071e1a3fe19c17faca06aec4a48f8456d3590f8643c618a023838aca46e0c03c4d
-
Filesize
879KB
MD545f6980ec4c0108bb1103cbc1906fa18
SHA126504d9884c97a2fab9aa128148a5b36becf9e92
SHA2568bc19641f9095f8c86c3836cf1f9d7b1dd14a1c62da0320ce09d5e27d0104927
SHA51264fc21f11fc4bfbd485111695ee2ac9e1e70f4107893e259aa4d705a7ad647e7968f3c223d8d647124c8b0d8f041bae074c600a0ae168b0eb166cd62ee877049
-
Filesize
1.1MB
MD5be689578752179e22bf915dbcf4f7520
SHA1e798e703bfb90707a2872b51da73f32af566aedb
SHA256de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e
SHA51289c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8
-
Filesize
1.1MB
MD5be689578752179e22bf915dbcf4f7520
SHA1e798e703bfb90707a2872b51da73f32af566aedb
SHA256de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e
SHA51289c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8
-
Filesize
754KB
MD5310a7ff41f6633132e6c2bc25e51e567
SHA15f687df8cc3185ed68d77d0e05502c2eb308c5c8
SHA256d1425edf482717cb64db2a36357866045b0c6306d919296591ffc9bc45d680ab
SHA512ee9b3114cb37e52793bccdf20a27158f5def67ed9c7d8eb772e1deaf5d5f9a0030e847dea40bb320637f29508f1be2a49c3095460a6fd3afbc3bca196f642980
-
Filesize
754KB
MD5310a7ff41f6633132e6c2bc25e51e567
SHA15f687df8cc3185ed68d77d0e05502c2eb308c5c8
SHA256d1425edf482717cb64db2a36357866045b0c6306d919296591ffc9bc45d680ab
SHA512ee9b3114cb37e52793bccdf20a27158f5def67ed9c7d8eb772e1deaf5d5f9a0030e847dea40bb320637f29508f1be2a49c3095460a6fd3afbc3bca196f642980
-
Filesize
471KB
MD5ac382bfcfaea86b5749f7abc571ccf12
SHA1928454bcce909ea349a03b14c043430905a88fdb
SHA256f7f8d1ebfed3afd13eb47392a7f502603ecb970a817c221682cd8f2a17ff2bb3
SHA51207cacc471ac863ac12db6f0d4c7a75d968dea257f7f5f722a830e9b5239f45071e1a3fe19c17faca06aec4a48f8456d3590f8643c618a023838aca46e0c03c4d
-
Filesize
471KB
MD5ac382bfcfaea86b5749f7abc571ccf12
SHA1928454bcce909ea349a03b14c043430905a88fdb
SHA256f7f8d1ebfed3afd13eb47392a7f502603ecb970a817c221682cd8f2a17ff2bb3
SHA51207cacc471ac863ac12db6f0d4c7a75d968dea257f7f5f722a830e9b5239f45071e1a3fe19c17faca06aec4a48f8456d3590f8643c618a023838aca46e0c03c4d
-
Filesize
400KB
MD520beeb0a82adcce3a58372804acc46be
SHA1c579d9017d2c8298fe075ff5c05963901330e72a
SHA256d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e
SHA5127636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd
-
Filesize
400KB
MD520beeb0a82adcce3a58372804acc46be
SHA1c579d9017d2c8298fe075ff5c05963901330e72a
SHA256d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e
SHA5127636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd
-
Filesize
45KB
MD54439bff7fec557da1fb9ed754a838be7
SHA11aac2acba06be9d26209fe5b8b236315a0f8f387
SHA2560283da2469f040a2aadcb65856947035f98dca525639670e658f7bdbe9d4f912
SHA512c277587bb27d13ac18edc1eadf2ba1e1638ba027de7303d45857ece5e3104b4eb9f7f1e67043f02c0a9785893827960e40c35a0661a02d28dfd0d7674db4a243
-
Filesize
225KB
MD56a59c469713da7bb9abc4b8f2e8ac6da
SHA1e87a23b50b3f3a41c50d62e558153d3a3010a02b
SHA2563d21285ae1a22e1954c31393ce1a7238054d9a78b5ec7560235261cb99df918d
SHA51216e7c44c8026016439f2c2eac8ae05a7f0ae6115882897d885837a6f5c37c3b19f5cba53202e691a11e632615d921adb50979077d0e50898cce49d2fbe7bca65
-
Filesize
879KB
MD545f6980ec4c0108bb1103cbc1906fa18
SHA126504d9884c97a2fab9aa128148a5b36becf9e92
SHA2568bc19641f9095f8c86c3836cf1f9d7b1dd14a1c62da0320ce09d5e27d0104927
SHA51264fc21f11fc4bfbd485111695ee2ac9e1e70f4107893e259aa4d705a7ad647e7968f3c223d8d647124c8b0d8f041bae074c600a0ae168b0eb166cd62ee877049
-
Filesize
1.4MB
MD5afd26f223230ad20eb208dbaa0164e43
SHA19c92cde80d982dec72e5a2fb6553bc1cd89e8319
SHA256fc0cb0682ccc37bdd72fab5106d45ebf7fb014b15004d65d627f6e2aed0750b4
SHA512e0e284ffdd4ef7421a0c0ffb1cf6e2aa82707a861be84e98713a3efd385f1347d8c869709d941d19c0fb3df0d7e40aec1803fb14cc379cec98eeaf8e196aefce
-
Filesize
471KB
MD5ac382bfcfaea86b5749f7abc571ccf12
SHA1928454bcce909ea349a03b14c043430905a88fdb
SHA256f7f8d1ebfed3afd13eb47392a7f502603ecb970a817c221682cd8f2a17ff2bb3
SHA51207cacc471ac863ac12db6f0d4c7a75d968dea257f7f5f722a830e9b5239f45071e1a3fe19c17faca06aec4a48f8456d3590f8643c618a023838aca46e0c03c4d
-
Filesize
471KB
MD5ac382bfcfaea86b5749f7abc571ccf12
SHA1928454bcce909ea349a03b14c043430905a88fdb
SHA256f7f8d1ebfed3afd13eb47392a7f502603ecb970a817c221682cd8f2a17ff2bb3
SHA51207cacc471ac863ac12db6f0d4c7a75d968dea257f7f5f722a830e9b5239f45071e1a3fe19c17faca06aec4a48f8456d3590f8643c618a023838aca46e0c03c4d
-
Filesize
1.1MB
MD5be689578752179e22bf915dbcf4f7520
SHA1e798e703bfb90707a2872b51da73f32af566aedb
SHA256de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e
SHA51289c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8
-
Filesize
1.1MB
MD5be689578752179e22bf915dbcf4f7520
SHA1e798e703bfb90707a2872b51da73f32af566aedb
SHA256de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e
SHA51289c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8
-
Filesize
1.1MB
MD5be689578752179e22bf915dbcf4f7520
SHA1e798e703bfb90707a2872b51da73f32af566aedb
SHA256de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e
SHA51289c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8