Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07/05/2023, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe
Resource
win10v2004-20230220-en
General
-
Target
90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe
-
Size
1.5MB
-
MD5
e2b30c0c90faeeb878ed21be152d2dc1
-
SHA1
b64e8bbd7d23f9585a7ff9b24a61a7ab119f1769
-
SHA256
90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f
-
SHA512
7126633aeaeaa91f08d5c0dce6129bfb7501287cad6ac106f1c64c2ab0cb010d3b870680047ea3e9dffdb3bfccab2a9d2a11f8057dd302dfaf140b34022bd74f
-
SSDEEP
24576:PnQ3GQdfKrh2G8uraReOgX1yFQ+5irxTCQJ5xvCwUXZMnKfJIxzN5b2K:P9QdIuWed+sKK+CQ5CwMZMnx0
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 18 IoCs
pid Process 464 Process not Found 924 alg.exe 1768 aspnet_state.exe 1860 mscorsvw.exe 1692 mscorsvw.exe 1760 mscorsvw.exe 800 mscorsvw.exe 960 dllhost.exe 1624 ehRecvr.exe 1140 ehsched.exe 1532 elevation_service.exe 1328 mscorsvw.exe 1268 mscorsvw.exe 2140 mscorsvw.exe 2256 mscorsvw.exe 2360 mscorsvw.exe 2480 mscorsvw.exe 2580 mscorsvw.exe -
Loads dropped DLL 5 IoCs
pid Process 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\system32\dllhost.exe 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe File opened for modification C:\Windows\system32\fxssvc.exe 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe File opened for modification C:\Windows\System32\alg.exe 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\7be776ff7693df14.bin alg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 836 set thread context of 652 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 32 PID 652 set thread context of 1944 652 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 35 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe -
Drops file in Windows directory 28 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.lock mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File opened for modification C:\Windows\ehome\ehRecvr.exe 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe File created C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{2F39144D-A0F9-4FEE-8429-A72FA52B0509}.crmlog dllhost.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenservicelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\ehome\ehsched.exe 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe File opened for modification C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{2F39144D-A0F9-4FEE-8429-A72FA52B0509}.crmlog dllhost.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 27 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\ShadowFileMaxClients = "32" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileInlineGrowthQuantumSeconds = "30" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileGrowthBudgetMs = "45000" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\LogMaxJobDemoteTimeMs = "5000" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\NvpRecCount = "32" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileGrowthQuantumSeconds = "180" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheHashTableSize = "67" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheWaitForSize = "32" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\LogInitialPageCount = "16" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheLongPageCount = "32" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\NvpClientsCount = "32" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\SwagBitsPerSecond = "19922944" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheShortPageCount = "64" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\NvpRecWaitForCounts = "32" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CriticalLowDiskSpace = "1073741824" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\Software ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CommitMaxCheckPoitnRateMs = "10000" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileDiscontinuitiesPerSecond = "20" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\LogMinJobWaitTimeMs = "3000" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CommitMaxCheckPointPageCount = "7" ehRec.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 876 ehRec.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe Token: SeTakeOwnershipPrivilege 652 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe Token: SeShutdownPrivilege 1760 mscorsvw.exe Token: SeShutdownPrivilege 800 mscorsvw.exe Token: 33 836 EhTray.exe Token: SeIncBasePriorityPrivilege 836 EhTray.exe Token: SeShutdownPrivilege 1760 mscorsvw.exe Token: SeDebugPrivilege 876 ehRec.exe Token: SeShutdownPrivilege 800 mscorsvw.exe Token: SeShutdownPrivilege 1760 mscorsvw.exe Token: SeShutdownPrivilege 1760 mscorsvw.exe Token: SeShutdownPrivilege 800 mscorsvw.exe Token: SeShutdownPrivilege 800 mscorsvw.exe Token: 33 836 EhTray.exe Token: SeIncBasePriorityPrivilege 836 EhTray.exe Token: SeShutdownPrivilege 800 mscorsvw.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 652 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 836 wrote to memory of 684 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 28 PID 836 wrote to memory of 684 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 28 PID 836 wrote to memory of 684 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 28 PID 836 wrote to memory of 684 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 28 PID 836 wrote to memory of 1288 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 29 PID 836 wrote to memory of 1288 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 29 PID 836 wrote to memory of 1288 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 29 PID 836 wrote to memory of 1288 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 29 PID 836 wrote to memory of 516 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 30 PID 836 wrote to memory of 516 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 30 PID 836 wrote to memory of 516 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 30 PID 836 wrote to memory of 516 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 30 PID 836 wrote to memory of 1912 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 31 PID 836 wrote to memory of 1912 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 31 PID 836 wrote to memory of 1912 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 31 PID 836 wrote to memory of 1912 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 31 PID 836 wrote to memory of 652 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 32 PID 836 wrote to memory of 652 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 32 PID 836 wrote to memory of 652 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 32 PID 836 wrote to memory of 652 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 32 PID 836 wrote to memory of 652 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 32 PID 836 wrote to memory of 652 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 32 PID 836 wrote to memory of 652 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 32 PID 836 wrote to memory of 652 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 32 PID 836 wrote to memory of 652 836 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 32 PID 652 wrote to memory of 1944 652 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 35 PID 652 wrote to memory of 1944 652 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 35 PID 652 wrote to memory of 1944 652 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 35 PID 652 wrote to memory of 1944 652 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 35 PID 652 wrote to memory of 1944 652 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 35 PID 652 wrote to memory of 1944 652 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 35 PID 652 wrote to memory of 1944 652 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 35 PID 652 wrote to memory of 1944 652 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 35 PID 652 wrote to memory of 1944 652 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 35 PID 800 wrote to memory of 1328 800 mscorsvw.exe 46 PID 800 wrote to memory of 1328 800 mscorsvw.exe 46 PID 800 wrote to memory of 1328 800 mscorsvw.exe 46 PID 800 wrote to memory of 1268 800 mscorsvw.exe 47 PID 800 wrote to memory of 1268 800 mscorsvw.exe 47 PID 800 wrote to memory of 1268 800 mscorsvw.exe 47 PID 1760 wrote to memory of 2140 1760 mscorsvw.exe 48 PID 1760 wrote to memory of 2140 1760 mscorsvw.exe 48 PID 1760 wrote to memory of 2140 1760 mscorsvw.exe 48 PID 1760 wrote to memory of 2140 1760 mscorsvw.exe 48 PID 1760 wrote to memory of 2256 1760 mscorsvw.exe 49 PID 1760 wrote to memory of 2256 1760 mscorsvw.exe 49 PID 1760 wrote to memory of 2256 1760 mscorsvw.exe 49 PID 1760 wrote to memory of 2256 1760 mscorsvw.exe 49 PID 1760 wrote to memory of 2360 1760 mscorsvw.exe 50 PID 1760 wrote to memory of 2360 1760 mscorsvw.exe 50 PID 1760 wrote to memory of 2360 1760 mscorsvw.exe 50 PID 1760 wrote to memory of 2360 1760 mscorsvw.exe 50 PID 1760 wrote to memory of 2480 1760 mscorsvw.exe 51 PID 1760 wrote to memory of 2480 1760 mscorsvw.exe 51 PID 1760 wrote to memory of 2480 1760 mscorsvw.exe 51 PID 1760 wrote to memory of 2480 1760 mscorsvw.exe 51 PID 1760 wrote to memory of 2580 1760 mscorsvw.exe 52 PID 1760 wrote to memory of 2580 1760 mscorsvw.exe 52 PID 1760 wrote to memory of 2580 1760 mscorsvw.exe 52 PID 1760 wrote to memory of 2580 1760 mscorsvw.exe 52 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe"C:\Users\Admin\AppData\Local\Temp\90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe"C:\Users\Admin\AppData\Local\Temp\90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe"2⤵PID:684
-
-
C:\Users\Admin\AppData\Local\Temp\90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe"C:\Users\Admin\AppData\Local\Temp\90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe"2⤵PID:1288
-
-
C:\Users\Admin\AppData\Local\Temp\90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe"C:\Users\Admin\AppData\Local\Temp\90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe"2⤵PID:516
-
-
C:\Users\Admin\AppData\Local\Temp\90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe"C:\Users\Admin\AppData\Local\Temp\90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe"2⤵PID:1912
-
-
C:\Users\Admin\AppData\Local\Temp\90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe"C:\Users\Admin\AppData\Local\Temp\90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe"2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1944
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:924
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
PID:1768
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1860
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1692
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 1d8 -NGENProcess 1dc -Pipe 1e8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2140
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 250 -NGENProcess 258 -Pipe 25c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2256
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 1f4 -NGENProcess 1e4 -Pipe 250 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2360
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f4 -InterruptEvent 264 -NGENProcess 1ec -Pipe 260 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2480
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 26c -NGENProcess 244 -Pipe 268 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2580
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 170 -InterruptEvent 15c -NGENProcess 160 -Pipe 16c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1328
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 15c -NGENProcess 160 -Pipe 170 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1268
-
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:960
-
C:\Windows\ehome\ehRecvr.exeC:\Windows\ehome\ehRecvr.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1624
-
C:\Windows\ehome\ehsched.exeC:\Windows\ehome\ehsched.exe1⤵
- Executes dropped EXE
PID:1140
-
C:\Windows\eHome\EhTray.exe"C:\Windows\eHome\EhTray.exe" /nav:-21⤵
- Suspicious use of AdjustPrivilegeToken
PID:836
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1532
-
C:\Windows\ehome\ehRec.exeC:\Windows\ehome\ehRec.exe -Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:876
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5337427f0c39224f20a306083c2dd4e18
SHA1587f91a8cc62e50c5ec178746ee4b53131469d4d
SHA2563b049834b322fce258bf508981470927115b2b1b6a72f9ea8344ec9c603f8816
SHA512ae79fe48abeaa52424c30543d74a998ea469daf1fb668bad2e36db5ace07104a2e2756835143c0ff6b31f0aa68dde1190acdc64cc97f1e9d308e2a5b2d15bde1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms
Filesize24B
MD5b9bd716de6739e51c620f2086f9c31e4
SHA19733d94607a3cba277e567af584510edd9febf62
SHA2567116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312
SHA512cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478
-
Filesize
1.3MB
MD58f4c3ea515b239ef47de4c875671fb95
SHA1067d0366900d0c48f44dea61f9929d5214bf506a
SHA2563af637e1d569613560323866ea5f3502cdbacccd8ee987ec5bca6bde31a4fae9
SHA512f7204b16543f2ddf413b87e218a085f1815b1d3ba371bcf738513847db3c10e466e0335e46c6f756aabf50bbed0e5df31ab1f4d94c270a9a30076af7c7df5662
-
Filesize
1.3MB
MD58f4c3ea515b239ef47de4c875671fb95
SHA1067d0366900d0c48f44dea61f9929d5214bf506a
SHA2563af637e1d569613560323866ea5f3502cdbacccd8ee987ec5bca6bde31a4fae9
SHA512f7204b16543f2ddf413b87e218a085f1815b1d3ba371bcf738513847db3c10e466e0335e46c6f756aabf50bbed0e5df31ab1f4d94c270a9a30076af7c7df5662
-
Filesize
872KB
MD5ce04de6f2e113471623e71bc96c24dac
SHA148624794005f8f4b2057391e89af14a876eeda8a
SHA2567edb2ac61c0584225745abdc8f0d732223130bcad9b34f5e8f8022aab0679daa
SHA512a41494d45592af382bc463f606cd3e5052ab04f11e059f1f2ba1f0a808d94aba1c218be1cfed89c895c347363253d6feab8650efea086b14102ba5d79e109a1b
-
Filesize
1.3MB
MD50fb3691a68f55da91f82223e71cd9d7b
SHA1c712e92d3b9988a6e8833b7b5a033287e905f41f
SHA2567d8ee06ccf69cf65a71d2696838534815ba56fab41cadc2e6d2b6d6fd5758773
SHA512cfb0ccc41a1839a451e0d0d217a15dc7b28c4c4e11f805df1dd41d0b0b19950fa142c99dbadaa55a9feb359366ea11d3e4c175e951867ccf61f605b319c7bb5c
-
Filesize
1.3MB
MD5da8a60f863c0e877573e7f584e47392f
SHA102ebf67901ae01275036366c48c6c7bfc4c8f94f
SHA256d999464255a3a69e1e65cbce890c205c1109e5afe22fa4e44fe4afcc4b63fb56
SHA5120b6abf2cd44bf20281f376e409156267147cf792cf2ad6df6a0698674207b6d1d9d719e7446ab97265d45a5469754ffdfcf47330ef041ac4ed990b3a5b392da1
-
Filesize
1.3MB
MD5da8a60f863c0e877573e7f584e47392f
SHA102ebf67901ae01275036366c48c6c7bfc4c8f94f
SHA256d999464255a3a69e1e65cbce890c205c1109e5afe22fa4e44fe4afcc4b63fb56
SHA5120b6abf2cd44bf20281f376e409156267147cf792cf2ad6df6a0698674207b6d1d9d719e7446ab97265d45a5469754ffdfcf47330ef041ac4ed990b3a5b392da1
-
Filesize
1.3MB
MD5da8a60f863c0e877573e7f584e47392f
SHA102ebf67901ae01275036366c48c6c7bfc4c8f94f
SHA256d999464255a3a69e1e65cbce890c205c1109e5afe22fa4e44fe4afcc4b63fb56
SHA5120b6abf2cd44bf20281f376e409156267147cf792cf2ad6df6a0698674207b6d1d9d719e7446ab97265d45a5469754ffdfcf47330ef041ac4ed990b3a5b392da1
-
Filesize
1.3MB
MD5da8a60f863c0e877573e7f584e47392f
SHA102ebf67901ae01275036366c48c6c7bfc4c8f94f
SHA256d999464255a3a69e1e65cbce890c205c1109e5afe22fa4e44fe4afcc4b63fb56
SHA5120b6abf2cd44bf20281f376e409156267147cf792cf2ad6df6a0698674207b6d1d9d719e7446ab97265d45a5469754ffdfcf47330ef041ac4ed990b3a5b392da1
-
Filesize
1.3MB
MD53ba2dde1d2d5e3d7b9dfd0f6a4a75713
SHA18769dc75e9bbe93e4df86701fc53de3922de9cb4
SHA256c321968ca4a294d4bf555a0a9ee086d6c16e848e46b2d7c66273dfe62e4e77c4
SHA512b2123b6c544bf496e154b90e1759df6878de8038e0ac7cd0fb4e6e502bf2692bba92aba6b715410713301fd35444a3b80141f68d2d08b0fcc670ae167b4ee0de
-
Filesize
1.3MB
MD53ba2dde1d2d5e3d7b9dfd0f6a4a75713
SHA18769dc75e9bbe93e4df86701fc53de3922de9cb4
SHA256c321968ca4a294d4bf555a0a9ee086d6c16e848e46b2d7c66273dfe62e4e77c4
SHA512b2123b6c544bf496e154b90e1759df6878de8038e0ac7cd0fb4e6e502bf2692bba92aba6b715410713301fd35444a3b80141f68d2d08b0fcc670ae167b4ee0de
-
Filesize
1003KB
MD573dd9a20e95b102d69cab32ce55402a7
SHA16f897fe3f0c183135d579728b7336bbc0fd33beb
SHA256c054cbcae380561387775ee84f2cb24ac1d1e9226fe26389a6f0f1f835a8e7d6
SHA51212f33dd781433c2ec370e86304f7017b8addef452a4818c373b88b82d80d774a2e1dc210be3c79e2668474ae86d3b2b81b0e0ce33600259293f0bfc9646a8c5f
-
Filesize
1.3MB
MD5ef68de211bda92c95b837504355b7c3b
SHA1d1013aaf935e49ec0eadc138cc7970fd31411c4e
SHA256217c3f3a674f54942222841c27042fe2d9ac7a24fe3ef12068f2f3ffe8ce1299
SHA512a0c638fe301073c8fd387885feff975f2d2e9c1c26dbfab862850428a81e4779ddf71f9bde1a3a4ed0dc75957d77b40bf72cb327d0cdfc7b528d51903b14eaf2
-
Filesize
1.3MB
MD5ef68de211bda92c95b837504355b7c3b
SHA1d1013aaf935e49ec0eadc138cc7970fd31411c4e
SHA256217c3f3a674f54942222841c27042fe2d9ac7a24fe3ef12068f2f3ffe8ce1299
SHA512a0c638fe301073c8fd387885feff975f2d2e9c1c26dbfab862850428a81e4779ddf71f9bde1a3a4ed0dc75957d77b40bf72cb327d0cdfc7b528d51903b14eaf2
-
Filesize
1.3MB
MD5ef68de211bda92c95b837504355b7c3b
SHA1d1013aaf935e49ec0eadc138cc7970fd31411c4e
SHA256217c3f3a674f54942222841c27042fe2d9ac7a24fe3ef12068f2f3ffe8ce1299
SHA512a0c638fe301073c8fd387885feff975f2d2e9c1c26dbfab862850428a81e4779ddf71f9bde1a3a4ed0dc75957d77b40bf72cb327d0cdfc7b528d51903b14eaf2
-
Filesize
1.3MB
MD5ef68de211bda92c95b837504355b7c3b
SHA1d1013aaf935e49ec0eadc138cc7970fd31411c4e
SHA256217c3f3a674f54942222841c27042fe2d9ac7a24fe3ef12068f2f3ffe8ce1299
SHA512a0c638fe301073c8fd387885feff975f2d2e9c1c26dbfab862850428a81e4779ddf71f9bde1a3a4ed0dc75957d77b40bf72cb327d0cdfc7b528d51903b14eaf2
-
Filesize
1.3MB
MD5ef68de211bda92c95b837504355b7c3b
SHA1d1013aaf935e49ec0eadc138cc7970fd31411c4e
SHA256217c3f3a674f54942222841c27042fe2d9ac7a24fe3ef12068f2f3ffe8ce1299
SHA512a0c638fe301073c8fd387885feff975f2d2e9c1c26dbfab862850428a81e4779ddf71f9bde1a3a4ed0dc75957d77b40bf72cb327d0cdfc7b528d51903b14eaf2
-
Filesize
1.3MB
MD5ef68de211bda92c95b837504355b7c3b
SHA1d1013aaf935e49ec0eadc138cc7970fd31411c4e
SHA256217c3f3a674f54942222841c27042fe2d9ac7a24fe3ef12068f2f3ffe8ce1299
SHA512a0c638fe301073c8fd387885feff975f2d2e9c1c26dbfab862850428a81e4779ddf71f9bde1a3a4ed0dc75957d77b40bf72cb327d0cdfc7b528d51903b14eaf2
-
Filesize
1.3MB
MD5ef68de211bda92c95b837504355b7c3b
SHA1d1013aaf935e49ec0eadc138cc7970fd31411c4e
SHA256217c3f3a674f54942222841c27042fe2d9ac7a24fe3ef12068f2f3ffe8ce1299
SHA512a0c638fe301073c8fd387885feff975f2d2e9c1c26dbfab862850428a81e4779ddf71f9bde1a3a4ed0dc75957d77b40bf72cb327d0cdfc7b528d51903b14eaf2
-
Filesize
1.3MB
MD5ed1b4fedcbb7348083676f31c82b2c6a
SHA14cb0b4bcba9eeac434d5a770f88e1c9a535b4478
SHA256cd05e50069e7ac242848e13dc912dee962c73544ef64030873e533983266ac2b
SHA5125b3eafd94d24dba594a67f6dd09dd7dea09ea81b2dc64fd4368cb1a4fe94c53e55caf637ffa7434c5bebce1c7c31c6e558631aed45bcbf2c96fbb078ddce6a32
-
Filesize
1.2MB
MD5248dc07c041134635e9a56a6ff3f5f1e
SHA18224fbb484e9afee25342219b644f5a7118ef948
SHA2569ebab16219e1dd5daab6682d4a1674b73764357c3ef7281b3f641414e8e16c0b
SHA512e75a3611daa64f0992005d79fd3cb8f53e1c6413b71b49460f64e486e77601053710e4d6c07030df331747f3d618594713741f1a489bbd81f34698b9063c2be4
-
Filesize
1.2MB
MD5330579499bbf67e45ea2f8a213bae370
SHA100a1ea519d0ba6c6b252aa2fd1f9608e2fa87603
SHA2562866a5dba93470d381c26957984f04755a9d8fe211e6ec6bb79d81e3a68e3800
SHA512583bcb769031c2ff7bc134a10308e8071b224169ff2fee68dbb0e073b915e2a4936acec18c22e4c6374cca267afe91f55ec0099e63d4a5188de9a859e60deabb
-
Filesize
1.3MB
MD586e46a08be0990c3893b09ec9f0bdce8
SHA1d7e878fc6a6ec62c7d26287198128b7797e371b4
SHA256f44f83b6f8d1d452286054aaecedbec6c56b233521404bfac58eadd5d3a5409c
SHA51272a7f19b9aab5129ccd2ecd840cc364e5c9666488cd23ad3902ce791c511d32868407325bbeb627d912496c5d1c6df0a5dad8116c7119c4bfa78775bcd4bb8da
-
Filesize
1.3MB
MD58f4c3ea515b239ef47de4c875671fb95
SHA1067d0366900d0c48f44dea61f9929d5214bf506a
SHA2563af637e1d569613560323866ea5f3502cdbacccd8ee987ec5bca6bde31a4fae9
SHA512f7204b16543f2ddf413b87e218a085f1815b1d3ba371bcf738513847db3c10e466e0335e46c6f756aabf50bbed0e5df31ab1f4d94c270a9a30076af7c7df5662
-
Filesize
1.3MB
MD50fb3691a68f55da91f82223e71cd9d7b
SHA1c712e92d3b9988a6e8833b7b5a033287e905f41f
SHA2567d8ee06ccf69cf65a71d2696838534815ba56fab41cadc2e6d2b6d6fd5758773
SHA512cfb0ccc41a1839a451e0d0d217a15dc7b28c4c4e11f805df1dd41d0b0b19950fa142c99dbadaa55a9feb359366ea11d3e4c175e951867ccf61f605b319c7bb5c
-
Filesize
1.3MB
MD5ed1b4fedcbb7348083676f31c82b2c6a
SHA14cb0b4bcba9eeac434d5a770f88e1c9a535b4478
SHA256cd05e50069e7ac242848e13dc912dee962c73544ef64030873e533983266ac2b
SHA5125b3eafd94d24dba594a67f6dd09dd7dea09ea81b2dc64fd4368cb1a4fe94c53e55caf637ffa7434c5bebce1c7c31c6e558631aed45bcbf2c96fbb078ddce6a32
-
Filesize
1.2MB
MD5248dc07c041134635e9a56a6ff3f5f1e
SHA18224fbb484e9afee25342219b644f5a7118ef948
SHA2569ebab16219e1dd5daab6682d4a1674b73764357c3ef7281b3f641414e8e16c0b
SHA512e75a3611daa64f0992005d79fd3cb8f53e1c6413b71b49460f64e486e77601053710e4d6c07030df331747f3d618594713741f1a489bbd81f34698b9063c2be4
-
Filesize
1.2MB
MD5330579499bbf67e45ea2f8a213bae370
SHA100a1ea519d0ba6c6b252aa2fd1f9608e2fa87603
SHA2562866a5dba93470d381c26957984f04755a9d8fe211e6ec6bb79d81e3a68e3800
SHA512583bcb769031c2ff7bc134a10308e8071b224169ff2fee68dbb0e073b915e2a4936acec18c22e4c6374cca267afe91f55ec0099e63d4a5188de9a859e60deabb
-
Filesize
1.3MB
MD586e46a08be0990c3893b09ec9f0bdce8
SHA1d7e878fc6a6ec62c7d26287198128b7797e371b4
SHA256f44f83b6f8d1d452286054aaecedbec6c56b233521404bfac58eadd5d3a5409c
SHA51272a7f19b9aab5129ccd2ecd840cc364e5c9666488cd23ad3902ce791c511d32868407325bbeb627d912496c5d1c6df0a5dad8116c7119c4bfa78775bcd4bb8da