Analysis
-
max time kernel
172s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13-05-2023 00:49
Static task
static1
Behavioral task
behavioral1
Sample
rensenWare.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
rensenWare.exe
Resource
win10v2004-20230220-en
General
-
Target
rensenWare.exe
-
Size
850KB
-
MD5
a2c251b29f91a9f2dd103d1cf4d3f642
-
SHA1
c756853b930edc2f105985f9ef67de67079c7c1b
-
SHA256
08e7dbcdca0fc27b535eebf80d4e2d8b9c164885b9e9d767819b8030abcfbeac
-
SHA512
714ea3d43ed1910554f6e30d9a16c37f7b7469b81b0d278c0f92bf0c3e65109bcd917ca70fd029d4433ba6db717886d170ac16a73dc8c015ad48f54f53b30b37
-
SSDEEP
12288:BMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9Kk8L0iw1j:BnsJ39LyjbJkQFMhmC+6GD9d8L0iu
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1292 ._cache_rensenWare.exe 672 Synaptics.exe 456 ._cache_Synaptics.exe -
Loads dropped DLL 7 IoCs
pid Process 1708 rensenWare.exe 1708 rensenWare.exe 1708 rensenWare.exe 672 Synaptics.exe 672 Synaptics.exe 1856 dw20.exe 588 dw20.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" rensenWare.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 756 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 756 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1292 1708 rensenWare.exe 28 PID 1708 wrote to memory of 1292 1708 rensenWare.exe 28 PID 1708 wrote to memory of 1292 1708 rensenWare.exe 28 PID 1708 wrote to memory of 1292 1708 rensenWare.exe 28 PID 1708 wrote to memory of 672 1708 rensenWare.exe 29 PID 1708 wrote to memory of 672 1708 rensenWare.exe 29 PID 1708 wrote to memory of 672 1708 rensenWare.exe 29 PID 1708 wrote to memory of 672 1708 rensenWare.exe 29 PID 672 wrote to memory of 456 672 Synaptics.exe 30 PID 672 wrote to memory of 456 672 Synaptics.exe 30 PID 672 wrote to memory of 456 672 Synaptics.exe 30 PID 672 wrote to memory of 456 672 Synaptics.exe 30 PID 1292 wrote to memory of 1856 1292 ._cache_rensenWare.exe 31 PID 1292 wrote to memory of 1856 1292 ._cache_rensenWare.exe 31 PID 1292 wrote to memory of 1856 1292 ._cache_rensenWare.exe 31 PID 1292 wrote to memory of 1856 1292 ._cache_rensenWare.exe 31 PID 456 wrote to memory of 588 456 ._cache_Synaptics.exe 32 PID 456 wrote to memory of 588 456 ._cache_Synaptics.exe 32 PID 456 wrote to memory of 588 456 ._cache_Synaptics.exe 32 PID 456 wrote to memory of 588 456 ._cache_Synaptics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\rensenWare.exe"C:\Users\Admin\AppData\Local\Temp\rensenWare.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\._cache_rensenWare.exe"C:\Users\Admin\AppData\Local\Temp\._cache_rensenWare.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 4523⤵
- Loads dropped DLL
PID:1856
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 4564⤵
- Loads dropped DLL
PID:588
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:756
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
850KB
MD5a2c251b29f91a9f2dd103d1cf4d3f642
SHA1c756853b930edc2f105985f9ef67de67079c7c1b
SHA25608e7dbcdca0fc27b535eebf80d4e2d8b9c164885b9e9d767819b8030abcfbeac
SHA512714ea3d43ed1910554f6e30d9a16c37f7b7469b81b0d278c0f92bf0c3e65109bcd917ca70fd029d4433ba6db717886d170ac16a73dc8c015ad48f54f53b30b37
-
Filesize
850KB
MD5a2c251b29f91a9f2dd103d1cf4d3f642
SHA1c756853b930edc2f105985f9ef67de67079c7c1b
SHA25608e7dbcdca0fc27b535eebf80d4e2d8b9c164885b9e9d767819b8030abcfbeac
SHA512714ea3d43ed1910554f6e30d9a16c37f7b7469b81b0d278c0f92bf0c3e65109bcd917ca70fd029d4433ba6db717886d170ac16a73dc8c015ad48f54f53b30b37
-
Filesize
850KB
MD5a2c251b29f91a9f2dd103d1cf4d3f642
SHA1c756853b930edc2f105985f9ef67de67079c7c1b
SHA25608e7dbcdca0fc27b535eebf80d4e2d8b9c164885b9e9d767819b8030abcfbeac
SHA512714ea3d43ed1910554f6e30d9a16c37f7b7469b81b0d278c0f92bf0c3e65109bcd917ca70fd029d4433ba6db717886d170ac16a73dc8c015ad48f54f53b30b37
-
Filesize
96KB
MD5f7ef31fef91a920ed709c13e7b4127ac
SHA129ab73cd907171d198787727f446118dd21365c3
SHA256ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37
SHA512a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760
-
Filesize
96KB
MD5f7ef31fef91a920ed709c13e7b4127ac
SHA129ab73cd907171d198787727f446118dd21365c3
SHA256ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37
SHA512a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760
-
Filesize
96KB
MD5f7ef31fef91a920ed709c13e7b4127ac
SHA129ab73cd907171d198787727f446118dd21365c3
SHA256ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37
SHA512a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760
-
Filesize
96KB
MD5f7ef31fef91a920ed709c13e7b4127ac
SHA129ab73cd907171d198787727f446118dd21365c3
SHA256ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37
SHA512a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760
-
Filesize
96KB
MD5f7ef31fef91a920ed709c13e7b4127ac
SHA129ab73cd907171d198787727f446118dd21365c3
SHA256ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37
SHA512a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
230KB
MD54f0b4ec55945ad72650105d2922aeff1
SHA12ab30be34a8cd964567d8d05d70434aeea403e1b
SHA256b5642145ad68b96690e8933e582e863ed3520f14af6dfe898abf2730397e23d5
SHA5126a7f9510823c275b05961beea6c3cfe35d2fba4f7de132c70c8550a17ba5656466c0e46e1e53061163ce89125c62a5ccbcb696a2da65582306fe6a40b4cced2c
-
Filesize
631KB
MD5ae4a029a497c634ba3b02bfe4a0b42d9
SHA1aed48690dd8f80162b09156828035a8b3a56ebf4
SHA256690cb63a3f7a299091081673f915682024ea3f45e81f2fff6942075a9eed967a
SHA512d9b4b929cb4177fe77e8805fb233f64ad1a241669c9cc5a151bb2cadb420efca5e22a43afa7444cb29a55e35882b600024d881c938a24d20a42d8322b858ac54
-
Filesize
850KB
MD5a2c251b29f91a9f2dd103d1cf4d3f642
SHA1c756853b930edc2f105985f9ef67de67079c7c1b
SHA25608e7dbcdca0fc27b535eebf80d4e2d8b9c164885b9e9d767819b8030abcfbeac
SHA512714ea3d43ed1910554f6e30d9a16c37f7b7469b81b0d278c0f92bf0c3e65109bcd917ca70fd029d4433ba6db717886d170ac16a73dc8c015ad48f54f53b30b37
-
Filesize
850KB
MD5a2c251b29f91a9f2dd103d1cf4d3f642
SHA1c756853b930edc2f105985f9ef67de67079c7c1b
SHA25608e7dbcdca0fc27b535eebf80d4e2d8b9c164885b9e9d767819b8030abcfbeac
SHA512714ea3d43ed1910554f6e30d9a16c37f7b7469b81b0d278c0f92bf0c3e65109bcd917ca70fd029d4433ba6db717886d170ac16a73dc8c015ad48f54f53b30b37
-
Filesize
850KB
MD5a2c251b29f91a9f2dd103d1cf4d3f642
SHA1c756853b930edc2f105985f9ef67de67079c7c1b
SHA25608e7dbcdca0fc27b535eebf80d4e2d8b9c164885b9e9d767819b8030abcfbeac
SHA512714ea3d43ed1910554f6e30d9a16c37f7b7469b81b0d278c0f92bf0c3e65109bcd917ca70fd029d4433ba6db717886d170ac16a73dc8c015ad48f54f53b30b37
-
Filesize
96KB
MD5f7ef31fef91a920ed709c13e7b4127ac
SHA129ab73cd907171d198787727f446118dd21365c3
SHA256ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37
SHA512a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760
-
Filesize
96KB
MD5f7ef31fef91a920ed709c13e7b4127ac
SHA129ab73cd907171d198787727f446118dd21365c3
SHA256ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37
SHA512a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760
-
Filesize
96KB
MD5f7ef31fef91a920ed709c13e7b4127ac
SHA129ab73cd907171d198787727f446118dd21365c3
SHA256ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37
SHA512a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760
-
Filesize
96KB
MD5f7ef31fef91a920ed709c13e7b4127ac
SHA129ab73cd907171d198787727f446118dd21365c3
SHA256ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37
SHA512a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760