Analysis
-
max time kernel
1779s -
max time network
1790s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
26-02-2023 22:02
Behavioral task
behavioral1
Sample
摩纳哥.7z
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
摩纳哥.7z
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
摩纳哥.7z
Resource
win10v2004-20230220-en
General
-
Target
摩纳哥.7z
-
Size
19.9MB
-
MD5
8d798197150cf22c2d63ff1181ca0535
-
SHA1
49bd04d964cfae91cc4021323dae9d51e8c33964
-
SHA256
00afff69b8f52c22df1875d98d75730cde0ea314c6e5b120636ed47deb12d014
-
SHA512
f84049e0266662e8aeac3a0d829e0461f9465d0450d2f5a0e111477a78aa05706d51457bb4f4d37591aac07e8e6145a05d6346210391ab4e01e211dea0904e33
-
SSDEEP
393216:O/Yz0z3hU/4T4e47EdNCVKko+kA27u2f2hLyBiFHNzF7V:Lz63hUWtjd4VCAHOENzFJ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Client.exeClient.exepid process 3504 Client.exe 2192 Client.exe -
Processes:
resource yara_rule behavioral1/memory/3504-264-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-266-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-267-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-268-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-269-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-271-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-273-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-275-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-277-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-279-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-281-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-283-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-285-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-287-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-289-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-291-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-293-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-295-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-297-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-299-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-301-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-303-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-305-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-307-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3504-309-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
Client.exeClient.exepid process 3504 Client.exe 2192 Client.exe -
Drops file in Windows directory 2 IoCs
Processes:
Client.exedescription ioc process File created \??\c:\windows\HPSocket4C.dll Client.exe File opened for modification \??\c:\windows\HPSocket4C.dll Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
Processes:
OpenWith.execmd.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Applications\7zFM.exe\shell\open OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 8c003100000000005456c396110050524f4752417e310000740009000400efbe724a6fa85456c3962e0000003f0000000000010000000000000000004a000000000021499a00500072006f006700720061006d002000460069006c0065007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100370038003100000018000000 OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Applications\7zFM.exe\shell OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Applications OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = ffffffff OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "2" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Applications\7zFM.exe\shell\open\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 50003100000000005456a7961000372d5a6970003c0009000400efbe5456a6965456a7962e00000035a5010000000800000000000000000000000000000054c0240137002d005a0069007000000014000000 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Applications\7zFM.exe\shell\open\command\ = "\"C:\\Program Files\\7-Zip\\7zFM.exe\" \"%1\"" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\NodeSlot = "1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
Client.exeClient.exepid process 3504 Client.exe 3504 Client.exe 3504 Client.exe 3504 Client.exe 2192 Client.exe 2192 Client.exe 2192 Client.exe 2192 Client.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
OpenWith.exe7zFM.exepid process 4580 OpenWith.exe 1640 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
7zFM.exe7zG.exedescription pid process Token: SeRestorePrivilege 1640 7zFM.exe Token: 35 1640 7zFM.exe Token: SeSecurityPrivilege 1640 7zFM.exe Token: SeRestorePrivilege 4812 7zG.exe Token: 35 4812 7zG.exe Token: SeSecurityPrivilege 4812 7zG.exe Token: SeSecurityPrivilege 4812 7zG.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
7zFM.exe7zG.exepid process 1640 7zFM.exe 1640 7zFM.exe 4812 7zG.exe -
Suspicious use of SetWindowsHookEx 26 IoCs
Processes:
OpenWith.exeClient.exeClient.exepid process 4580 OpenWith.exe 4580 OpenWith.exe 4580 OpenWith.exe 4580 OpenWith.exe 4580 OpenWith.exe 4580 OpenWith.exe 4580 OpenWith.exe 4580 OpenWith.exe 4580 OpenWith.exe 4580 OpenWith.exe 4580 OpenWith.exe 4580 OpenWith.exe 4580 OpenWith.exe 4580 OpenWith.exe 4580 OpenWith.exe 4580 OpenWith.exe 4580 OpenWith.exe 4580 OpenWith.exe 4580 OpenWith.exe 4580 OpenWith.exe 3504 Client.exe 3504 Client.exe 3504 Client.exe 2192 Client.exe 2192 Client.exe 2192 Client.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
OpenWith.exedescription pid process target process PID 4580 wrote to memory of 1640 4580 OpenWith.exe 7zFM.exe PID 4580 wrote to memory of 1640 4580 OpenWith.exe 7zFM.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\摩纳哥.7z1⤵
- Modifies registry class
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\摩纳哥.7z"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\摩纳哥\" -spe -an -ai#7zMap8540:84:7zEvent51551⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\摩纳哥\Client.exe"C:\Users\Admin\AppData\Local\Temp\摩纳哥\Client.exe"1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\摩纳哥\Client.exe"C:\Users\Admin\AppData\Local\Temp\摩纳哥\Client.exe"1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.dbFilesize
14KB
MD5b4e4be263d72037eee95f5e8bfe45908
SHA171cb6f11289bf71b30b9306c6310ea7fb5cbb192
SHA256ab61ddeead7bbf4816d2a85ffa45a449e07ecdcc02cdac62e0af6d0e220824c9
SHA5128afefdc1a3e86fc383a6581a1941075a173d02e7c5c3d642c6543dd774deb844ae5530e40a816a2719b716b6fc691a55a660fb4d5b7e24fca0e847aedafc51f0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.dbFilesize
14KB
MD5144acc86394ae16e09c6dbac9d29e5c8
SHA182e76abef0dc2416becacfcd674aa95533e4ce2f
SHA25608c6cede2061b2013a8c603dcefe84ac54a54a22d61ad9be5a72c4a23bfeca3a
SHA512acee07cdb8fc1a1ca17449be98c2200f36361a804802730d5b36fe1bece2e3cecc832582f01bedb4b703af3621d5ed4ea212d7552a8dfca0750570bce32b8a49
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.dbFilesize
14KB
MD5144acc86394ae16e09c6dbac9d29e5c8
SHA182e76abef0dc2416becacfcd674aa95533e4ce2f
SHA25608c6cede2061b2013a8c603dcefe84ac54a54a22d61ad9be5a72c4a23bfeca3a
SHA512acee07cdb8fc1a1ca17449be98c2200f36361a804802730d5b36fe1bece2e3cecc832582f01bedb4b703af3621d5ed4ea212d7552a8dfca0750570bce32b8a49
-
C:\Users\Admin\AppData\Local\Temp\摩纳哥\Client.exeFilesize
15.8MB
MD5b678a598c16d3c98cb65a330ebbdfd7b
SHA1a1c4997f9066231623d3ed545a64abd3435cc20b
SHA2563048cd91f71ef67483120edcf6fdba99c4c0a55cf50c5aafb8ad0748cf590e9c
SHA512a31b5b744393f52d4b73bfc09e140b3a17f3c0ddfd8cfaaded9393ee18c160fed3e7397fbb0ad8c7c0c64c152268c488136e76651a65f8da7450550ae1071efe
-
C:\Users\Admin\AppData\Local\Temp\摩纳哥\Client.exeFilesize
15.8MB
MD5b678a598c16d3c98cb65a330ebbdfd7b
SHA1a1c4997f9066231623d3ed545a64abd3435cc20b
SHA2563048cd91f71ef67483120edcf6fdba99c4c0a55cf50c5aafb8ad0748cf590e9c
SHA512a31b5b744393f52d4b73bfc09e140b3a17f3c0ddfd8cfaaded9393ee18c160fed3e7397fbb0ad8c7c0c64c152268c488136e76651a65f8da7450550ae1071efe
-
C:\Users\Admin\AppData\Local\Temp\摩纳哥\Client.exeFilesize
15.8MB
MD5b678a598c16d3c98cb65a330ebbdfd7b
SHA1a1c4997f9066231623d3ed545a64abd3435cc20b
SHA2563048cd91f71ef67483120edcf6fdba99c4c0a55cf50c5aafb8ad0748cf590e9c
SHA512a31b5b744393f52d4b73bfc09e140b3a17f3c0ddfd8cfaaded9393ee18c160fed3e7397fbb0ad8c7c0c64c152268c488136e76651a65f8da7450550ae1071efe
-
C:\Windows\HPSocket4C.dllFilesize
2.1MB
MD5c091a823c41bb5bc6c5a1ab6c926504c
SHA17b358a9211f8f5e3ce22f38075caf605fc4d2032
SHA256c58334cb8bd8e7a2c998d0717fff8bacbd873ab949e40a0e5f053dd51b67cca4
SHA512742ea0c78115f602c16a793d6d34ea97f0ff8bd4fc1ab28b90b7b7a3dc6fe6b921615ce97c0b23839e18f632d8e09f4319052de532dd9d31b70a22f12b7cc68d
-
\??\c:\windows\HPSocket4C.dllFilesize
2.1MB
MD5c091a823c41bb5bc6c5a1ab6c926504c
SHA17b358a9211f8f5e3ce22f38075caf605fc4d2032
SHA256c58334cb8bd8e7a2c998d0717fff8bacbd873ab949e40a0e5f053dd51b67cca4
SHA512742ea0c78115f602c16a793d6d34ea97f0ff8bd4fc1ab28b90b7b7a3dc6fe6b921615ce97c0b23839e18f632d8e09f4319052de532dd9d31b70a22f12b7cc68d
-
memory/2192-312-0x0000000001470000-0x0000000001471000-memory.dmpFilesize
4KB
-
memory/2192-314-0x00000000014F0000-0x00000000014F1000-memory.dmpFilesize
4KB
-
memory/2192-311-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/2192-318-0x0000000001530000-0x0000000001531000-memory.dmpFilesize
4KB
-
memory/2192-317-0x0000000001520000-0x0000000001521000-memory.dmpFilesize
4KB
-
memory/2192-316-0x0000000001510000-0x0000000001511000-memory.dmpFilesize
4KB
-
memory/2192-315-0x0000000001500000-0x0000000001501000-memory.dmpFilesize
4KB
-
memory/2192-313-0x00000000014E0000-0x00000000014E1000-memory.dmpFilesize
4KB
-
memory/3504-271-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-289-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-257-0x0000000000400000-0x0000000001420000-memory.dmpFilesize
16.1MB
-
memory/3504-264-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-266-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-267-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-268-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-269-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-256-0x0000000003340000-0x0000000003341000-memory.dmpFilesize
4KB
-
memory/3504-273-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-275-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-277-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-279-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-281-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-283-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-285-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-287-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-255-0x0000000003330000-0x0000000003331000-memory.dmpFilesize
4KB
-
memory/3504-291-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-293-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-295-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-297-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-299-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-301-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-254-0x0000000003320000-0x0000000003321000-memory.dmpFilesize
4KB
-
memory/3504-253-0x0000000003310000-0x0000000003311000-memory.dmpFilesize
4KB
-
memory/3504-252-0x0000000003300000-0x0000000003301000-memory.dmpFilesize
4KB
-
memory/3504-250-0x00000000032D0000-0x00000000032D1000-memory.dmpFilesize
4KB
-
memory/3504-251-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/3504-249-0x00000000031B0000-0x00000000031B1000-memory.dmpFilesize
4KB
-
memory/3504-303-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-305-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-307-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/3504-309-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB