Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
25/10/2023, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe
Resource
win10v2004-20231020-en
General
-
Target
a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe
-
Size
3.4MB
-
MD5
8b6693a9fd8f3a9ca63e933c7e1284bc
-
SHA1
94fe1a59213d6cb266e5e6b8761b9b7a45512e1f
-
SHA256
a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec6265edeca16511bc115
-
SHA512
882ffd091cae2a658cb5b992a3c3c8e06519bedcee1ed629b4d933bfbea2e32531e04519ca76f450a4a014bf851360cb56d72c7bd2c13907c308b26fa0a0a2e9
-
SSDEEP
49152:Q5qWhABbYQFw/3MywBAfm079cyxuc5BhBKiJ+av9kgzr0dt1cOZaX:ZWhEywBgm0OQ5BhkivHr0bps
Malware Config
Extracted
smokeloader
2022
http://servermlogs27.xyz/statweb255/
http://servmblog45.xyz/statweb255/
http://demblog575.xyz/statweb255/
http://admlogs85x.xyz/statweb255/
http://blogmstat389.xyz/statweb255/
http://blogmstat255.xyz/statweb255/
Signatures
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 5 IoCs
resource yara_rule behavioral1/files/0x0003000000012698-673.dat family_ammyyadmin behavioral1/files/0x0003000000012698-670.dat family_ammyyadmin behavioral1/files/0x0003000000012698-668.dat family_ammyyadmin behavioral1/files/0x0003000000012698-726.dat family_ammyyadmin behavioral1/files/0x0003000000012698-923.dat family_ammyyadmin -
Detect rhadamanthys stealer shellcode 5 IoCs
resource yara_rule behavioral1/memory/2624-21-0x0000000000AC0000-0x0000000000EC0000-memory.dmp family_rhadamanthys behavioral1/memory/2624-24-0x0000000000AC0000-0x0000000000EC0000-memory.dmp family_rhadamanthys behavioral1/memory/2624-23-0x0000000000AC0000-0x0000000000EC0000-memory.dmp family_rhadamanthys behavioral1/memory/2624-33-0x0000000000AC0000-0x0000000000EC0000-memory.dmp family_rhadamanthys behavioral1/memory/2624-35-0x0000000000AC0000-0x0000000000EC0000-memory.dmp family_rhadamanthys -
Phobos
Phobos ransomware appeared at the beginning of 2019.
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2624 created 1196 2624 a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe 11 -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (70) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 2692 netsh.exe 240 netsh.exe -
Deletes itself 1 IoCs
pid Process 2668 certreq.exe -
Drops startup file 1 IoCs
description ioc Process File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\707F.exe 707F.exe -
Executes dropped EXE 9 IoCs
pid Process 2892 HslIX7z3C].exe 2944 6BT.exe 1672 hTxH4CRm0.exe 1800 6BT.exe 2360 707F.exe 1872 707F.exe 2260 707F.exe 1836 707F.exe 576 svchost.exe -
Loads dropped DLL 6 IoCs
pid Process 2892 HslIX7z3C].exe 2892 HslIX7z3C].exe 2360 707F.exe 2260 707F.exe 2104 explorer.exe 2104 explorer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook certreq.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\707F = "C:\\Users\\Admin\\AppData\\Local\\707F.exe" 707F.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Run\707F = "C:\\Users\\Admin\\AppData\\Local\\707F.exe" 707F.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\Program Files\desktop.ini 707F.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3425689832-2386927309-2650718742-1000\desktop.ini 707F.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3425689832-2386927309-2650718742-1000\desktop.ini 707F.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 707F.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 svchost.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2956 set thread context of 2624 2956 a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe 28 PID 2944 set thread context of 1800 2944 6BT.exe 38 PID 2360 set thread context of 1872 2360 707F.exe 44 PID 2260 set thread context of 1836 2260 707F.exe 46 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\lt.txt 707F.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\mip.exe.mui 707F.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\sysinfo.id[E3090175-3483].[[email protected]].8base 707F.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\eclipse.inf 707F.exe File opened for modification C:\Program Files\Common Files\System\msadc\msdaprsr.dll 707F.exe File opened for modification C:\Program Files\Internet Explorer\networkinspection.dll 707F.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\Marengo 707F.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+6 707F.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\sw.pak.id[E3090175-3483].[[email protected]].8base 707F.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\default.jfc 707F.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Berlin 707F.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt 707F.exe File opened for modification C:\Program Files\DVD Maker\es-ES\DVDMaker.exe.mui 707F.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Circle_SelectionSubpictureA.png 707F.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\whitemask1047.png 707F.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\play-background.png 707F.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\jvm.dll.id[E3090175-3483].[[email protected]].8base 707F.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_sv.properties 707F.exe File opened for modification C:\Program Files\DVD Maker\Shared\Filters.xml 707F.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Chicago.id[E3090175-3483].[[email protected]].8base 707F.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Mazatlan 707F.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Ojinaga.id[E3090175-3483].[[email protected]].8base 707F.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\EET 707F.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt 707F.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsptg.xml 707F.exe File opened for modification C:\Program Files\DVD Maker\Shared\DissolveAnother.png 707F.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_rightarrow.png 707F.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\setEmbeddedCP.id[E3090175-3483].[[email protected]].8base 707F.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\AccessBridgePackages.h 707F.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\dnsns.jar 707F.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\ja-jp-sym.xml 707F.exe File opened for modification C:\Program Files\Common Files\System\wab32.dll 707F.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\EST5EDT.id[E3090175-3483].[[email protected]].8base 707F.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsrus.xml 707F.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_pt_BR.jar.id[E3090175-3483].[[email protected]].8base 707F.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Rangoon.id[E3090175-3483].[[email protected]].8base 707F.exe File created C:\Program Files\7-Zip\License.txt.id[E3090175-3483].[[email protected]].8base 707F.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsfra.xml 707F.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\IpsMigrationPlugin.dll.mui 707F.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Perf_Scenes_Mask1.png 707F.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe.id[E3090175-3483].[[email protected]].8base 707F.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\w2k_lsa_auth.dll 707F.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Bishkek.id[E3090175-3483].[[email protected]].8base 707F.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\epl-v10.html.id[E3090175-3483].[[email protected]].8base 707F.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\highlight.png 707F.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\v8_context_snapshot.bin.id[E3090175-3483].[[email protected]].8base 707F.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Choibalsan.id[E3090175-3483].[[email protected]].8base 707F.exe File created C:\Program Files\DisableJoin.pub.id[E3090175-3483].[[email protected]].8base 707F.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe.id[E3090175-3483].[[email protected]].8base 707F.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\COPYRIGHT.id[E3090175-3483].[[email protected]].8base 707F.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Fakaofo 707F.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-correct.avi 707F.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwresmlm.dat 707F.exe File opened for modification C:\Program Files\DVD Maker\de-DE\DVDMaker.exe.mui 707F.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\dblook.bat 707F.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\msvcr100.dll.id[E3090175-3483].[[email protected]].8base 707F.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\verify.dll.id[E3090175-3483].[[email protected]].8base 707F.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\GMT 707F.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\dt_shmem.dll 707F.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\selection_subpicture.png 707F.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\setEmbeddedCP 707F.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\LICENSE 707F.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.cpl 707F.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Hovd 707F.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6BT.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6BT.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6BT.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 certreq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString certreq.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 HslIX7z3C].exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString HslIX7z3C].exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1132 timeout.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2776 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2624 a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe 2624 a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe 2624 a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe 2624 a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe 2668 certreq.exe 2668 certreq.exe 2668 certreq.exe 2668 certreq.exe 1800 6BT.exe 1800 6BT.exe 2892 HslIX7z3C].exe 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE -
Suspicious behavior: MapViewOfSection 33 IoCs
pid Process 1800 6BT.exe 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 2104 explorer.exe 2104 explorer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2956 a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe Token: SeDebugPrivilege 2944 6BT.exe Token: SeDebugPrivilege 2360 707F.exe Token: SeDebugPrivilege 2260 707F.exe Token: SeDebugPrivilege 1872 707F.exe Token: SeBackupPrivilege 2728 vssvc.exe Token: SeRestorePrivilege 2728 vssvc.exe Token: SeAuditPrivilege 2728 vssvc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 576 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2624 2956 a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe 28 PID 2956 wrote to memory of 2624 2956 a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe 28 PID 2956 wrote to memory of 2624 2956 a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe 28 PID 2956 wrote to memory of 2624 2956 a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe 28 PID 2956 wrote to memory of 2624 2956 a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe 28 PID 2956 wrote to memory of 2624 2956 a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe 28 PID 2956 wrote to memory of 2624 2956 a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe 28 PID 2956 wrote to memory of 2624 2956 a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe 28 PID 2956 wrote to memory of 2624 2956 a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe 28 PID 2624 wrote to memory of 2668 2624 a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe 30 PID 2624 wrote to memory of 2668 2624 a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe 30 PID 2624 wrote to memory of 2668 2624 a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe 30 PID 2624 wrote to memory of 2668 2624 a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe 30 PID 2624 wrote to memory of 2668 2624 a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe 30 PID 2624 wrote to memory of 2668 2624 a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe 30 PID 2944 wrote to memory of 1800 2944 6BT.exe 38 PID 2944 wrote to memory of 1800 2944 6BT.exe 38 PID 2944 wrote to memory of 1800 2944 6BT.exe 38 PID 2944 wrote to memory of 1800 2944 6BT.exe 38 PID 2944 wrote to memory of 1800 2944 6BT.exe 38 PID 2944 wrote to memory of 1800 2944 6BT.exe 38 PID 2944 wrote to memory of 1800 2944 6BT.exe 38 PID 2892 wrote to memory of 400 2892 HslIX7z3C].exe 40 PID 2892 wrote to memory of 400 2892 HslIX7z3C].exe 40 PID 2892 wrote to memory of 400 2892 HslIX7z3C].exe 40 PID 2892 wrote to memory of 400 2892 HslIX7z3C].exe 40 PID 400 wrote to memory of 1132 400 cmd.exe 42 PID 400 wrote to memory of 1132 400 cmd.exe 42 PID 400 wrote to memory of 1132 400 cmd.exe 42 PID 400 wrote to memory of 1132 400 cmd.exe 42 PID 1196 wrote to memory of 2360 1196 Explorer.EXE 43 PID 1196 wrote to memory of 2360 1196 Explorer.EXE 43 PID 1196 wrote to memory of 2360 1196 Explorer.EXE 43 PID 1196 wrote to memory of 2360 1196 Explorer.EXE 43 PID 2360 wrote to memory of 1872 2360 707F.exe 44 PID 2360 wrote to memory of 1872 2360 707F.exe 44 PID 2360 wrote to memory of 1872 2360 707F.exe 44 PID 2360 wrote to memory of 1872 2360 707F.exe 44 PID 2360 wrote to memory of 1872 2360 707F.exe 44 PID 2360 wrote to memory of 1872 2360 707F.exe 44 PID 2360 wrote to memory of 1872 2360 707F.exe 44 PID 2360 wrote to memory of 1872 2360 707F.exe 44 PID 2360 wrote to memory of 1872 2360 707F.exe 44 PID 2360 wrote to memory of 1872 2360 707F.exe 44 PID 2360 wrote to memory of 1872 2360 707F.exe 44 PID 2260 wrote to memory of 1836 2260 707F.exe 46 PID 2260 wrote to memory of 1836 2260 707F.exe 46 PID 2260 wrote to memory of 1836 2260 707F.exe 46 PID 2260 wrote to memory of 1836 2260 707F.exe 46 PID 2260 wrote to memory of 1836 2260 707F.exe 46 PID 2260 wrote to memory of 1836 2260 707F.exe 46 PID 2260 wrote to memory of 1836 2260 707F.exe 46 PID 2260 wrote to memory of 1836 2260 707F.exe 46 PID 2260 wrote to memory of 1836 2260 707F.exe 46 PID 2260 wrote to memory of 1836 2260 707F.exe 46 PID 2260 wrote to memory of 1836 2260 707F.exe 46 PID 1196 wrote to memory of 1156 1196 Explorer.EXE 47 PID 1196 wrote to memory of 1156 1196 Explorer.EXE 47 PID 1196 wrote to memory of 1156 1196 Explorer.EXE 47 PID 1196 wrote to memory of 1156 1196 Explorer.EXE 47 PID 1196 wrote to memory of 1156 1196 Explorer.EXE 47 PID 1196 wrote to memory of 2028 1196 Explorer.EXE 48 PID 1196 wrote to memory of 2028 1196 Explorer.EXE 48 PID 1196 wrote to memory of 2028 1196 Explorer.EXE 48 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe"C:\Users\Admin\AppData\Local\Temp\a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exeC:\Users\Admin\AppData\Local\Temp\a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2624
-
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵
- Deletes itself
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2668
-
-
C:\Users\Admin\AppData\Local\Temp\707F.exeC:\Users\Admin\AppData\Local\Temp\707F.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\707F.exeC:\Users\Admin\AppData\Local\Temp\707F.exe3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\707F.exe"C:\Users\Admin\AppData\Local\Temp\707F.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\707F.exeC:\Users\Admin\AppData\Local\Temp\707F.exe5⤵
- Executes dropped EXE
PID:1836
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:1620
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:2776
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:3020
-
C:\Windows\system32\netsh.exenetsh advfirewall set currentprofile state off5⤵
- Modifies Windows Firewall
PID:2692
-
-
C:\Windows\system32\netsh.exenetsh firewall set opmode mode=disable5⤵
- Modifies Windows Firewall
PID:240
-
-
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1156
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:2028
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:2452
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:2828
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:848
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:1356
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:912
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:904
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:2260
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:2020
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:2424
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:2508
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:2144
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:708
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
- Loads dropped DLL
- Suspicious behavior: MapViewOfSection
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\F7B.tmp\svchost.exeC:\Users\Admin\AppData\Local\Temp\F7B.tmp\svchost.exe -debug3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of FindShellTrayWindow
PID:576 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe4⤵PID:1320
-
-
-
-
C:\Users\Admin\AppData\Local\Microsoft\HslIX7z3C].exe"C:\Users\Admin\AppData\Local\Microsoft\HslIX7z3C].exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Microsoft\HslIX7z3C].exe" & del "C:\ProgramData\*.dll"" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:1132
-
-
-
C:\Users\Admin\AppData\Local\Microsoft\6BT.exe"C:\Users\Admin\AppData\Local\Microsoft\6BT.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Microsoft\6BT.exeC:\Users\Admin\AppData\Local\Microsoft\6BT.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1800
-
-
C:\Users\Admin\AppData\Local\Microsoft\hTxH4CRm0.exe"C:\Users\Admin\AppData\Local\Microsoft\hTxH4CRm0.exe"1⤵
- Executes dropped EXE
PID:1672
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2728
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Indicator Removal
2File Deletion
2Modify Registry
1Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPsWW2.cab.id[E3090175-3483].[[email protected]].8base
Filesize159.5MB
MD5cd08b79c19edbcb0e0b14ba3afcbf973
SHA10d81b69b15ab31c9ebe6db393ca82f432db22b19
SHA25662170a674254d30bf4fa774f7d590542b25b82266bea3c04b2510045c45096ee
SHA512262d00555ceda5619b3e78f6deeb7045e9bb860bfc62ec4b705b70af886f450e2f15102e194de60f0d5c64acd18cd01548b8771aa2989c603d73fd16d0716650
-
Filesize
2.5MB
MD5a5e52d00a57904485aeb8e6580ce4666
SHA18f10588d8fcb6bb4d734c6e31fdaf2c165f87d92
SHA25613d55838fe9e2e638ea8d21e86dab4fc28c8d9ba94526b79d48d0e83ce21fe71
SHA512f14ca4c6017ffff6df0141cd706770225b9418029b69e37ff1f7d50ce2941cefb1e3f6d20df1897cb6cf3dc8db8e171d4ee94b72dac0b9375c31cb2e652b0b76
-
Filesize
2.5MB
MD5a5e52d00a57904485aeb8e6580ce4666
SHA18f10588d8fcb6bb4d734c6e31fdaf2c165f87d92
SHA25613d55838fe9e2e638ea8d21e86dab4fc28c8d9ba94526b79d48d0e83ce21fe71
SHA512f14ca4c6017ffff6df0141cd706770225b9418029b69e37ff1f7d50ce2941cefb1e3f6d20df1897cb6cf3dc8db8e171d4ee94b72dac0b9375c31cb2e652b0b76
-
Filesize
2.5MB
MD5a5e52d00a57904485aeb8e6580ce4666
SHA18f10588d8fcb6bb4d734c6e31fdaf2c165f87d92
SHA25613d55838fe9e2e638ea8d21e86dab4fc28c8d9ba94526b79d48d0e83ce21fe71
SHA512f14ca4c6017ffff6df0141cd706770225b9418029b69e37ff1f7d50ce2941cefb1e3f6d20df1897cb6cf3dc8db8e171d4ee94b72dac0b9375c31cb2e652b0b76
-
Filesize
284KB
MD5f445dce24fe09b59d9affb9f0a16ee7e
SHA19d2b2ef3e57c7a571c20d078dbac82576cdfcb30
SHA2567476d2335a1f3cf87f1995a40147d6ee0acaf9cf0c9895a595365942b64be5a3
SHA5126e721fbfc49a7780b20be1173795f602b3b4ccf9a8ce5625fc38ec15f818943dd7a0e56a75b4cb9719f2255b28d2ec538257f55ea383f2407069e5f93314edb8
-
Filesize
284KB
MD5f445dce24fe09b59d9affb9f0a16ee7e
SHA19d2b2ef3e57c7a571c20d078dbac82576cdfcb30
SHA2567476d2335a1f3cf87f1995a40147d6ee0acaf9cf0c9895a595365942b64be5a3
SHA5126e721fbfc49a7780b20be1173795f602b3b4ccf9a8ce5625fc38ec15f818943dd7a0e56a75b4cb9719f2255b28d2ec538257f55ea383f2407069e5f93314edb8
-
Filesize
968KB
MD52a40a56b3dbe361864baac57a7815de4
SHA1a0b67c7eb5bb378010ada7a3cf6bfe4101df9049
SHA2563d62c31dd2a3749a264d72bd87c287c9367d3198d612c5566ca54809b714af99
SHA5126c426f00cac5bbf67fd6e56c95561b8ad94da32d1199cfbf5d9e3b2627b39cdf8e089856fd346a44097006a0f32a78480b32554f39ba4ceaf72182126f78e4b2
-
Filesize
2.6MB
MD5f4d64c9ae825a8b1e0db64c93d37eb2a
SHA103d03b2fcafc1fc36b960b6351e951fe40fb0c66
SHA256c83894f6f01a0d4a492c2e05966816e27dac6b9093f83b499b6a5b2f28b53cec
SHA5125bc061c49628d4c72114366ef81b451f44f14d2ab8a8dedb9699d894156091dab2dca4f04f810651397876959139e8a28d6acba81da803b3e723c834d88749fa
-
Filesize
2.6MB
MD5f4d64c9ae825a8b1e0db64c93d37eb2a
SHA103d03b2fcafc1fc36b960b6351e951fe40fb0c66
SHA256c83894f6f01a0d4a492c2e05966816e27dac6b9093f83b499b6a5b2f28b53cec
SHA5125bc061c49628d4c72114366ef81b451f44f14d2ab8a8dedb9699d894156091dab2dca4f04f810651397876959139e8a28d6acba81da803b3e723c834d88749fa
-
Filesize
2.6MB
MD5f4d64c9ae825a8b1e0db64c93d37eb2a
SHA103d03b2fcafc1fc36b960b6351e951fe40fb0c66
SHA256c83894f6f01a0d4a492c2e05966816e27dac6b9093f83b499b6a5b2f28b53cec
SHA5125bc061c49628d4c72114366ef81b451f44f14d2ab8a8dedb9699d894156091dab2dca4f04f810651397876959139e8a28d6acba81da803b3e723c834d88749fa
-
Filesize
2.6MB
MD5f4d64c9ae825a8b1e0db64c93d37eb2a
SHA103d03b2fcafc1fc36b960b6351e951fe40fb0c66
SHA256c83894f6f01a0d4a492c2e05966816e27dac6b9093f83b499b6a5b2f28b53cec
SHA5125bc061c49628d4c72114366ef81b451f44f14d2ab8a8dedb9699d894156091dab2dca4f04f810651397876959139e8a28d6acba81da803b3e723c834d88749fa
-
Filesize
2.6MB
MD5f4d64c9ae825a8b1e0db64c93d37eb2a
SHA103d03b2fcafc1fc36b960b6351e951fe40fb0c66
SHA256c83894f6f01a0d4a492c2e05966816e27dac6b9093f83b499b6a5b2f28b53cec
SHA5125bc061c49628d4c72114366ef81b451f44f14d2ab8a8dedb9699d894156091dab2dca4f04f810651397876959139e8a28d6acba81da803b3e723c834d88749fa
-
Filesize
92KB
MD5f4c031bf36bab9f4c833ff6853e21e6d
SHA160f8f48f2dbe99039c1b51bdc583edb793247386
SHA256fbe839712f81f119c2d401a6e893b0c9b867f9e05c9078ec2f380ac8033c9f35
SHA512e2e17c0cd499460dc79b1e1d45b88abd35e84ecee9024e4f052e7eade371f7017fd88399ecf7bce1c23bc7926276660aef1d878ace1b571f50213e17fd6e057a
-
Filesize
798KB
MD590aadf2247149996ae443e2c82af3730
SHA1050b7eba825412b24e3f02d76d7da5ae97e10502
SHA256ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a
SHA512eec32bb82b230dd309c29712e72d4469250e651449e127479d178eddbafd5a46ec8048a753bc2c1a0fdf1dc3ed72a9453ca66fb49cbf0f95a12704e5427182be
-
Filesize
798KB
MD590aadf2247149996ae443e2c82af3730
SHA1050b7eba825412b24e3f02d76d7da5ae97e10502
SHA256ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a
SHA512eec32bb82b230dd309c29712e72d4469250e651449e127479d178eddbafd5a46ec8048a753bc2c1a0fdf1dc3ed72a9453ca66fb49cbf0f95a12704e5427182be
-
Filesize
798KB
MD590aadf2247149996ae443e2c82af3730
SHA1050b7eba825412b24e3f02d76d7da5ae97e10502
SHA256ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a
SHA512eec32bb82b230dd309c29712e72d4469250e651449e127479d178eddbafd5a46ec8048a753bc2c1a0fdf1dc3ed72a9453ca66fb49cbf0f95a12704e5427182be
-
Filesize
2.6MB
MD5f4d64c9ae825a8b1e0db64c93d37eb2a
SHA103d03b2fcafc1fc36b960b6351e951fe40fb0c66
SHA256c83894f6f01a0d4a492c2e05966816e27dac6b9093f83b499b6a5b2f28b53cec
SHA5125bc061c49628d4c72114366ef81b451f44f14d2ab8a8dedb9699d894156091dab2dca4f04f810651397876959139e8a28d6acba81da803b3e723c834d88749fa
-
C:\Users\Admin\Desktop\CompressUnregister.sql.id[E3090175-3483].[[email protected]].8base
Filesize372KB
MD54bb1285fdcb23787fbbd910f491e4638
SHA134f664cfb6522ec25e712a5e7e0f1fd1ed4f8226
SHA25662e25405d7ffff8d4d4892cbddc3389fe772de3efcd6c6c93ffd652097062de1
SHA5129db0db55307364a3e92991c9dde3e8225522402df622967457d78404f1a0191059afa6d2b535e61a041410ecd0cd61ac192e79ae62be754fc2cd1557f9e00fed
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2.6MB
MD5f4d64c9ae825a8b1e0db64c93d37eb2a
SHA103d03b2fcafc1fc36b960b6351e951fe40fb0c66
SHA256c83894f6f01a0d4a492c2e05966816e27dac6b9093f83b499b6a5b2f28b53cec
SHA5125bc061c49628d4c72114366ef81b451f44f14d2ab8a8dedb9699d894156091dab2dca4f04f810651397876959139e8a28d6acba81da803b3e723c834d88749fa
-
Filesize
2.6MB
MD5f4d64c9ae825a8b1e0db64c93d37eb2a
SHA103d03b2fcafc1fc36b960b6351e951fe40fb0c66
SHA256c83894f6f01a0d4a492c2e05966816e27dac6b9093f83b499b6a5b2f28b53cec
SHA5125bc061c49628d4c72114366ef81b451f44f14d2ab8a8dedb9699d894156091dab2dca4f04f810651397876959139e8a28d6acba81da803b3e723c834d88749fa
-
Filesize
798KB
MD590aadf2247149996ae443e2c82af3730
SHA1050b7eba825412b24e3f02d76d7da5ae97e10502
SHA256ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a
SHA512eec32bb82b230dd309c29712e72d4469250e651449e127479d178eddbafd5a46ec8048a753bc2c1a0fdf1dc3ed72a9453ca66fb49cbf0f95a12704e5427182be
-
Filesize
798KB
MD590aadf2247149996ae443e2c82af3730
SHA1050b7eba825412b24e3f02d76d7da5ae97e10502
SHA256ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a
SHA512eec32bb82b230dd309c29712e72d4469250e651449e127479d178eddbafd5a46ec8048a753bc2c1a0fdf1dc3ed72a9453ca66fb49cbf0f95a12704e5427182be