Analysis
-
max time kernel
149s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2022, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
48c4ac00c8bea03f17cea62ec021dcd3ddd50db8bb9c85ee0ffba68b970daf63.exe
Resource
win10v2004-20221111-en
General
-
Target
48c4ac00c8bea03f17cea62ec021dcd3ddd50db8bb9c85ee0ffba68b970daf63.exe
-
Size
1.1MB
-
MD5
c551a87ede300f78a48fadfe6c7b14af
-
SHA1
4c4c5cd829fe657d640dfd4baf356a45e55e13ee
-
SHA256
48c4ac00c8bea03f17cea62ec021dcd3ddd50db8bb9c85ee0ffba68b970daf63
-
SHA512
7eb738ea5644937c5e09b7218801ffee25d6f009be7a8d8afd1e8f4fff35b57f09ca044df84edbafe8dbed3a7c7bf766e6dcca7fda1f2b67e2d5e017c2dae67b
-
SSDEEP
24576:MINJmEwrc3nPabM8SA1kHSvNIJdTKlwZ8a8dh4u:MINj0c3PwM8SA1kA7li2
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 10 396 rundll32.exe 11 396 rundll32.exe 42 396 rundll32.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\aic_file_icons_retina_thumb_highContrast_bow\Parameters\ServiceDll = "C:\\Program Files (x86)\\Windows Sidebar\\Shared Gadgets\\aic_file_icons_retina_thumb_highContrast_bow.dll" rundll32.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\aic_file_icons_retina_thumb_highContrast_bow\ImagePath = "C:\\Windows\\system32\\svchost.exe -k LocalService" rundll32.exe -
Loads dropped DLL 3 IoCs
pid Process 396 rundll32.exe 4560 svchost.exe 1824 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts rundll32.exe -
Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 396 set thread context of 1992 396 rundll32.exe 92 -
Drops file in Program Files directory 43 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\fy.txt rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\move.svg rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\LICENSE.txt rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia\MPP\QuickTime.mpp rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-core-synch-l1-2-0.dll rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\trash.gif rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\reviews_super.gif rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\manifest.json rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\trash.gif rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-core-file-l1-2-0.dll rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Edit_R_Exp_RHP.aapp rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\RTC.der rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\QuickTime.mpp rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-runtime-l1-1-0.dll rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\application.ini rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\move.svg rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\Comments.aapp rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\pref\channel-prefs.js rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-convert-l1-1-0.dll rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\blocklist.xml rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Comments.aapp rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\close_x.png rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\EPDF_Full.aapp rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-locale-l1-1-0.dll rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-utility-l1-1-0.dll rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\reviews_super.gif rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\manifest.json rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\Edit_R_Exp_RHP.aapp rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\dependentlibs.list rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\close_x.png rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\LICENSE.txt rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\aic_file_icons_retina_thumb_highContrast_bow.dll rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\EPDF_Full.aapp rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\RTC.der rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2180 1432 WerFault.exe 82 -
Checks processor information in registry 2 TTPs 63 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 svchost.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff rundll32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5DDAD3F8F73B08D12E1671F5A0FC552A851830E9 rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5DDAD3F8F73B08D12E1671F5A0FC552A851830E9\Blob = 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 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4560 svchost.exe 4560 svchost.exe 396 rundll32.exe 396 rundll32.exe 396 rundll32.exe 396 rundll32.exe 396 rundll32.exe 396 rundll32.exe 4560 svchost.exe 4560 svchost.exe 4560 svchost.exe 4560 svchost.exe 4560 svchost.exe 4560 svchost.exe 396 rundll32.exe 396 rundll32.exe 4560 svchost.exe 4560 svchost.exe 4560 svchost.exe 4560 svchost.exe 4560 svchost.exe 4560 svchost.exe 4560 svchost.exe 4560 svchost.exe 4560 svchost.exe 4560 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 396 rundll32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1992 rundll32.exe 396 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1432 wrote to memory of 396 1432 48c4ac00c8bea03f17cea62ec021dcd3ddd50db8bb9c85ee0ffba68b970daf63.exe 83 PID 1432 wrote to memory of 396 1432 48c4ac00c8bea03f17cea62ec021dcd3ddd50db8bb9c85ee0ffba68b970daf63.exe 83 PID 1432 wrote to memory of 396 1432 48c4ac00c8bea03f17cea62ec021dcd3ddd50db8bb9c85ee0ffba68b970daf63.exe 83 PID 396 wrote to memory of 1992 396 rundll32.exe 92 PID 396 wrote to memory of 1992 396 rundll32.exe 92 PID 396 wrote to memory of 1992 396 rundll32.exe 92 PID 4560 wrote to memory of 1824 4560 svchost.exe 96 PID 4560 wrote to memory of 1824 4560 svchost.exe 96 PID 4560 wrote to memory of 1824 4560 svchost.exe 96 PID 396 wrote to memory of 2816 396 rundll32.exe 98 PID 396 wrote to memory of 2816 396 rundll32.exe 98 PID 396 wrote to memory of 2816 396 rundll32.exe 98 PID 396 wrote to memory of 4748 396 rundll32.exe 100 PID 396 wrote to memory of 4748 396 rundll32.exe 100 PID 396 wrote to memory of 4748 396 rundll32.exe 100 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\48c4ac00c8bea03f17cea62ec021dcd3ddd50db8bb9c85ee0ffba68b970daf63.exe"C:\Users\Admin\AppData\Local\Temp\48c4ac00c8bea03f17cea62ec021dcd3ddd50db8bb9c85ee0ffba68b970daf63.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Dfuqft.tmp",Dsdupihuqo2⤵
- Blocklisted process makes network request
- Sets DLL path for service in the registry
- Sets service image path in registry
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:396 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 223173⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1992
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵PID:2816
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵PID:4748
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 5282⤵
- Program crash
PID:2180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1432 -ip 14321⤵PID:3688
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2040
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k LocalService1⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windows sidebar\shared gadgets\aic_file_icons_retina_thumb_highcontrast_bow.dll",UxY9bTRR2⤵
- Loads dropped DLL
- Checks processor information in registry
PID:1824
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\aic_file_icons_retina_thumb_highContrast_bow.dll
Filesize792KB
MD5f71ab7e910c7d5abdd11f949a7ad37bd
SHA166ebd3fe09df04647b6bc762d92b6282a41a2890
SHA256590a1d25bfb1ea248a6c65510127dd94df99a44cab8a83ef66d3fd91574cfcc8
SHA51250ba6e7ab47718aed2db3b229f97d2cc464bc5a1e6b0af0ce1bf9c2a1639ac44f98a46b993b25348d14c8c7989ba927b8d1e40387f89834cb35afa15ed63350c
-
C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\aic_file_icons_retina_thumb_highContrast_bow.dll
Filesize792KB
MD5f71ab7e910c7d5abdd11f949a7ad37bd
SHA166ebd3fe09df04647b6bc762d92b6282a41a2890
SHA256590a1d25bfb1ea248a6c65510127dd94df99a44cab8a83ef66d3fd91574cfcc8
SHA51250ba6e7ab47718aed2db3b229f97d2cc464bc5a1e6b0af0ce1bf9c2a1639ac44f98a46b993b25348d14c8c7989ba927b8d1e40387f89834cb35afa15ed63350c
-
Filesize
3.5MB
MD57b84847b4cb1136fab547e34cdb71db3
SHA16d55d0fb517393c38afc55f328e2acc85f8f0731
SHA2565cfa862af6313b07b0adcfb84bc4e70ede4fb30698f5ca884de60f720d4651f2
SHA51225788488d8a23913740b903122f3f1a330f45da75c5f4c72933d437762845417fd46ba98a8b394e279f8334fdbe320c5333118d2f91fc69cdf84263d47a20b03
-
Filesize
3.5MB
MD521df73c9f90990ca8aad276e91a4bb6c
SHA18e8a9a8b78a2651f02cb557c611370e98ed1922b
SHA256cffac2590116d0448b58c12a4eaba66fb9f379748cb35b4e60335d7b62403347
SHA512e06174325e68a66d7deee86b5ee597a6ef3fd56267584d503883a0bd271968ebc08881bb387cf77d27c14d6841f50c4f8446b57e06bd0755716cec6d7b561575
-
Filesize
128KB
MD592940338867c5a5280e1dfb5261ee87b
SHA1f233ac37ca6cef59690eab0df1a963c2d40e25f5
SHA256858c25b50b1eeb51fa5b49fe8f60404126b4c1ebd511b2270eac082b01cd5949
SHA51237751bf504d67409da9f03162e2c794290f46d883202f5c8517897d87b47409e01e9efaf45b569568e98eaec61630a8be953133f0d83820092a9092b83ecf0eb
-
Filesize
13KB
MD591452b27335b69acc128a8a841bfe405
SHA17d63c758a2d4d16ef4175637ed17d5ad2080a329
SHA256ce07da21a959291739ec76f403576ef995d1bb29826b490184c2fe6a4e5c7b10
SHA512ba5ff3e4e596e685ec3dff0951c298c76fd2240f774d0d01b80bce6ad5e234a208d0f775c0d2b30d0b9dfefb3e8bce173db4b1e77a9ca16251dde662a005163b
-
Filesize
16KB
MD594f42a18776c4c82e2943aa9743c76fc
SHA1dbd6eef9c25ac632936e135214302f5890f9699f
SHA256dd16e31d240dfa4cc5fd2394d42ebb21fbc42a141438b58bff23af7335aad5a6
SHA51217a795b141da24aad43ae654167aba8c7c5de5df0149712600c649736bdcc14aacc3b5f12072b9e6b17a87bfee92a03654a2e05f6547986596b12d7d04c47644
-
Filesize
1KB
MD509e877cc25ec3ade6e0d56000025e7ae
SHA1fef683c766926d84804867a6a711c200e2ceb406
SHA256995f07448661dec2389b445cbe054e4fce31d07bed2f3f9f4bc94ee9a875fc92
SHA51202b7ed4cba2f3b153f055c51b24eb4a7ca9cec136274a00fcc2efebd21ad410d826d92b0113229e2817930a6a84dfa27e809290cb0522535202116c24ac8f1a3
-
Filesize
28KB
MD51f93b502e78190a2f496c2d9558e069d
SHA16ae6249493d36682270c0d5e3eb3c472fdd2766e
SHA2565c5b0de42d55486ed61dd3a6e96ab09f467bb38ae39fced97adc51ba07426c0e
SHA512cf07724c203a82c9f202d53f63ea00ab0df2f97484bd3b9abe1a001f2e531f505ddd4ff8f2d5a2769dd9d2d60e9c1d03dd3ab5143542688f944cfd35c6f1cdf3
-
Filesize
792KB
MD59e3ff54c77c7d43bfdf8cff1d31c3c51
SHA19681f127f0300093ac15d8a3fc16c289f0b9c045
SHA2562c683e8b9889636eb8279bdb6cf9181e939021acb2cbbed109b27aab6f47861d
SHA512d7b6ff58a48ce21250e13ffd1f57f041615e83cfd3fc2627ea0951a32ad8141fbe760765faada136cf3ab31c9165a0ad0f88ef95f35f58735d169046c257fcec
-
Filesize
792KB
MD59e3ff54c77c7d43bfdf8cff1d31c3c51
SHA19681f127f0300093ac15d8a3fc16c289f0b9c045
SHA2562c683e8b9889636eb8279bdb6cf9181e939021acb2cbbed109b27aab6f47861d
SHA512d7b6ff58a48ce21250e13ffd1f57f041615e83cfd3fc2627ea0951a32ad8141fbe760765faada136cf3ab31c9165a0ad0f88ef95f35f58735d169046c257fcec
-
\??\c:\program files (x86)\windows sidebar\shared gadgets\aic_file_icons_retina_thumb_highcontrast_bow.dll
Filesize792KB
MD5f71ab7e910c7d5abdd11f949a7ad37bd
SHA166ebd3fe09df04647b6bc762d92b6282a41a2890
SHA256590a1d25bfb1ea248a6c65510127dd94df99a44cab8a83ef66d3fd91574cfcc8
SHA51250ba6e7ab47718aed2db3b229f97d2cc464bc5a1e6b0af0ce1bf9c2a1639ac44f98a46b993b25348d14c8c7989ba927b8d1e40387f89834cb35afa15ed63350c