Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231130-en -
resource tags
arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system -
submitted
03-12-2023 02:24
Static task
static1
Behavioral task
behavioral1
Sample
1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
Resource
win10v2004-20231127-en
General
-
Target
1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
-
Size
2.2MB
-
MD5
07a27ce678e07245f97aea3ef3310005
-
SHA1
475db932ef060ac59584b1130521ed0990c5a631
-
SHA256
1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651
-
SHA512
3aa52830da5696f170c50d6359ebd222858ef1579e3aae4f78fd8c7705f8a351dad09918261a230e834894502a1bf2339d616d4546bc0f35571bdb82523aa60e
-
SSDEEP
49152:knsHyjtk2MYC5GDsHMxAJ4GIMqyBqYKhSVffgs54ouLwc:knsmtk2akxAJ4oqYLKhSlj2ouLwc
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 11 IoCs
Processes:
._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exeSynaptics.exe._cache_Synaptics.exe._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe._cache_Synaptics.exe._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe._cache_._cache_Synaptics.exepid process 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 2664 Synaptics.exe 2840 ._cache_Synaptics.exe 1048 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 1944 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 2236 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 2332 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 2036 ._cache_Synaptics.exe 268 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 1924 ._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 3064 ._cache_._cache_Synaptics.exe -
Loads dropped DLL 17 IoCs
Processes:
1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exeSynaptics.exe._cache_Synaptics.exe._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe._cache_Synaptics.exe._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exepid process 1896 1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 1896 1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 1896 1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 1896 1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 2664 Synaptics.exe 2664 Synaptics.exe 2664 Synaptics.exe 2840 ._cache_Synaptics.exe 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 2036 ._cache_Synaptics.exe 2036 ._cache_Synaptics.exe 268 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 268 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
Processes:
._cache_._cache_Synaptics.exe._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe Key opened \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe Key opened \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe Key opened \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 api.ipify.org 9 api.ipify.org -
Suspicious use of SetThreadContext 2 IoCs
Processes:
._cache_Synaptics.exe._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exedescription pid process target process PID 2840 set thread context of 2036 2840 ._cache_Synaptics.exe ._cache_Synaptics.exe PID 3060 set thread context of 268 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEdescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE -
Modifies registry class 64 IoCs
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2944 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe._cache_._cache_Synaptics.exepid process 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 1924 ._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 1924 ._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe 3064 ._cache_._cache_Synaptics.exe 3064 ._cache_._cache_Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe._cache_._cache_Synaptics.exe._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exedescription pid process Token: SeDebugPrivilege 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe Token: SeDebugPrivilege 3064 ._cache_._cache_Synaptics.exe Token: SeDebugPrivilege 1924 ._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
EXCEL.EXEpid process 2944 EXCEL.EXE -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exeSynaptics.exe._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe._cache_Synaptics.exe._cache_Synaptics.exe._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exedescription pid process target process PID 1896 wrote to memory of 3060 1896 1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 1896 wrote to memory of 3060 1896 1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 1896 wrote to memory of 3060 1896 1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 1896 wrote to memory of 3060 1896 1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 1896 wrote to memory of 2664 1896 1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe Synaptics.exe PID 1896 wrote to memory of 2664 1896 1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe Synaptics.exe PID 1896 wrote to memory of 2664 1896 1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe Synaptics.exe PID 1896 wrote to memory of 2664 1896 1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe Synaptics.exe PID 2664 wrote to memory of 2840 2664 Synaptics.exe ._cache_Synaptics.exe PID 2664 wrote to memory of 2840 2664 Synaptics.exe ._cache_Synaptics.exe PID 2664 wrote to memory of 2840 2664 Synaptics.exe ._cache_Synaptics.exe PID 2664 wrote to memory of 2840 2664 Synaptics.exe ._cache_Synaptics.exe PID 3060 wrote to memory of 1048 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 3060 wrote to memory of 1048 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 3060 wrote to memory of 1048 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 3060 wrote to memory of 1048 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 2840 wrote to memory of 2036 2840 ._cache_Synaptics.exe ._cache_Synaptics.exe PID 2840 wrote to memory of 2036 2840 ._cache_Synaptics.exe ._cache_Synaptics.exe PID 2840 wrote to memory of 2036 2840 ._cache_Synaptics.exe ._cache_Synaptics.exe PID 2840 wrote to memory of 2036 2840 ._cache_Synaptics.exe ._cache_Synaptics.exe PID 2840 wrote to memory of 2036 2840 ._cache_Synaptics.exe ._cache_Synaptics.exe PID 2840 wrote to memory of 2036 2840 ._cache_Synaptics.exe ._cache_Synaptics.exe PID 3060 wrote to memory of 1944 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 3060 wrote to memory of 1944 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 3060 wrote to memory of 1944 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 3060 wrote to memory of 1944 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 3060 wrote to memory of 2236 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 3060 wrote to memory of 2236 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 3060 wrote to memory of 2236 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 3060 wrote to memory of 2236 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 3060 wrote to memory of 2332 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 3060 wrote to memory of 2332 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 3060 wrote to memory of 2332 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 3060 wrote to memory of 2332 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 2840 wrote to memory of 2036 2840 ._cache_Synaptics.exe ._cache_Synaptics.exe PID 3060 wrote to memory of 268 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 3060 wrote to memory of 268 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 3060 wrote to memory of 268 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 3060 wrote to memory of 268 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 2840 wrote to memory of 2036 2840 ._cache_Synaptics.exe ._cache_Synaptics.exe PID 2840 wrote to memory of 2036 2840 ._cache_Synaptics.exe ._cache_Synaptics.exe PID 3060 wrote to memory of 268 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 3060 wrote to memory of 268 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 2840 wrote to memory of 2036 2840 ._cache_Synaptics.exe ._cache_Synaptics.exe PID 3060 wrote to memory of 268 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 2840 wrote to memory of 2036 2840 ._cache_Synaptics.exe ._cache_Synaptics.exe PID 3060 wrote to memory of 268 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 3060 wrote to memory of 268 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 2840 wrote to memory of 2036 2840 ._cache_Synaptics.exe ._cache_Synaptics.exe PID 3060 wrote to memory of 268 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 3060 wrote to memory of 268 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 3060 wrote to memory of 268 3060 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 2036 wrote to memory of 3064 2036 ._cache_Synaptics.exe ._cache_._cache_Synaptics.exe PID 2036 wrote to memory of 3064 2036 ._cache_Synaptics.exe ._cache_._cache_Synaptics.exe PID 2036 wrote to memory of 3064 2036 ._cache_Synaptics.exe ._cache_._cache_Synaptics.exe PID 2036 wrote to memory of 3064 2036 ._cache_Synaptics.exe ._cache_._cache_Synaptics.exe PID 268 wrote to memory of 1924 268 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 268 wrote to memory of 1924 268 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 268 wrote to memory of 1924 268 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe PID 268 wrote to memory of 1924 268 ._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe ._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe -
outlook_office_path 1 IoCs
Processes:
._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe -
outlook_win_path 1 IoCs
Processes:
._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe"C:\Users\Admin\AppData\Local\Temp\1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe"C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe"C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe"3⤵
- Executes dropped EXE
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe"C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe"C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe"3⤵
- Executes dropped EXE
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe"C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe"3⤵
- Executes dropped EXE
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe"C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe"3⤵
- Executes dropped EXE
PID:1944 -
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\._cache_._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_._cache_Synaptics.exe"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2944
-
C:\Users\Admin\AppData\Local\Temp\._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe"C:\Users\Admin\AppData\Local\Temp\._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe"1⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD507a27ce678e07245f97aea3ef3310005
SHA1475db932ef060ac59584b1130521ed0990c5a631
SHA2561c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651
SHA5123aa52830da5696f170c50d6359ebd222858ef1579e3aae4f78fd8c7705f8a351dad09918261a230e834894502a1bf2339d616d4546bc0f35571bdb82523aa60e
-
Filesize
2.2MB
MD507a27ce678e07245f97aea3ef3310005
SHA1475db932ef060ac59584b1130521ed0990c5a631
SHA2561c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651
SHA5123aa52830da5696f170c50d6359ebd222858ef1579e3aae4f78fd8c7705f8a351dad09918261a230e834894502a1bf2339d616d4546bc0f35571bdb82523aa60e
-
Filesize
2.2MB
MD507a27ce678e07245f97aea3ef3310005
SHA1475db932ef060ac59584b1130521ed0990c5a631
SHA2561c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651
SHA5123aa52830da5696f170c50d6359ebd222858ef1579e3aae4f78fd8c7705f8a351dad09918261a230e834894502a1bf2339d616d4546bc0f35571bdb82523aa60e
-
C:\Users\Admin\AppData\Local\Temp\._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
Filesize237KB
MD560b60c0077424578115f6075c88aaf7e
SHA178c633a8530623a234bc9faed0af8c5a61dd2589
SHA2568bbbcf41316eec589be4a7486747afaaec42b81f5689364d0fa30f48cf30ce2d
SHA51233f2f34e46887561158298a176795f684584d29e7152c420e2bf59d1a374768733c0d020cf0485b011b4b7f360c38ecc217dd4287ff407cb871fe4690b35686a
-
C:\Users\Admin\AppData\Local\Temp\._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
Filesize237KB
MD560b60c0077424578115f6075c88aaf7e
SHA178c633a8530623a234bc9faed0af8c5a61dd2589
SHA2568bbbcf41316eec589be4a7486747afaaec42b81f5689364d0fa30f48cf30ce2d
SHA51233f2f34e46887561158298a176795f684584d29e7152c420e2bf59d1a374768733c0d020cf0485b011b4b7f360c38ecc217dd4287ff407cb871fe4690b35686a
-
Filesize
237KB
MD560b60c0077424578115f6075c88aaf7e
SHA178c633a8530623a234bc9faed0af8c5a61dd2589
SHA2568bbbcf41316eec589be4a7486747afaaec42b81f5689364d0fa30f48cf30ce2d
SHA51233f2f34e46887561158298a176795f684584d29e7152c420e2bf59d1a374768733c0d020cf0485b011b4b7f360c38ecc217dd4287ff407cb871fe4690b35686a
-
Filesize
237KB
MD560b60c0077424578115f6075c88aaf7e
SHA178c633a8530623a234bc9faed0af8c5a61dd2589
SHA2568bbbcf41316eec589be4a7486747afaaec42b81f5689364d0fa30f48cf30ce2d
SHA51233f2f34e46887561158298a176795f684584d29e7152c420e2bf59d1a374768733c0d020cf0485b011b4b7f360c38ecc217dd4287ff407cb871fe4690b35686a
-
Filesize
237KB
MD560b60c0077424578115f6075c88aaf7e
SHA178c633a8530623a234bc9faed0af8c5a61dd2589
SHA2568bbbcf41316eec589be4a7486747afaaec42b81f5689364d0fa30f48cf30ce2d
SHA51233f2f34e46887561158298a176795f684584d29e7152c420e2bf59d1a374768733c0d020cf0485b011b4b7f360c38ecc217dd4287ff407cb871fe4690b35686a
-
C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
Filesize1.4MB
MD51aaccaee804f247a9efed42cbaae20f6
SHA1e8a5d53efee26fc2c74a9528da4c5c99d4212774
SHA25653ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b
SHA5122abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18
-
C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
Filesize1.4MB
MD51aaccaee804f247a9efed42cbaae20f6
SHA1e8a5d53efee26fc2c74a9528da4c5c99d4212774
SHA25653ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b
SHA5122abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18
-
C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
Filesize1.4MB
MD51aaccaee804f247a9efed42cbaae20f6
SHA1e8a5d53efee26fc2c74a9528da4c5c99d4212774
SHA25653ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b
SHA5122abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18
-
C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
Filesize1.4MB
MD51aaccaee804f247a9efed42cbaae20f6
SHA1e8a5d53efee26fc2c74a9528da4c5c99d4212774
SHA25653ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b
SHA5122abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18
-
C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
Filesize1.4MB
MD51aaccaee804f247a9efed42cbaae20f6
SHA1e8a5d53efee26fc2c74a9528da4c5c99d4212774
SHA25653ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b
SHA5122abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18
-
C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
Filesize1.4MB
MD51aaccaee804f247a9efed42cbaae20f6
SHA1e8a5d53efee26fc2c74a9528da4c5c99d4212774
SHA25653ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b
SHA5122abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18
-
C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
Filesize1.4MB
MD51aaccaee804f247a9efed42cbaae20f6
SHA1e8a5d53efee26fc2c74a9528da4c5c99d4212774
SHA25653ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b
SHA5122abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18
-
C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
Filesize1.4MB
MD51aaccaee804f247a9efed42cbaae20f6
SHA1e8a5d53efee26fc2c74a9528da4c5c99d4212774
SHA25653ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b
SHA5122abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18
-
Filesize
1.4MB
MD51aaccaee804f247a9efed42cbaae20f6
SHA1e8a5d53efee26fc2c74a9528da4c5c99d4212774
SHA25653ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b
SHA5122abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18
-
Filesize
1.4MB
MD51aaccaee804f247a9efed42cbaae20f6
SHA1e8a5d53efee26fc2c74a9528da4c5c99d4212774
SHA25653ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b
SHA5122abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18
-
Filesize
1.4MB
MD51aaccaee804f247a9efed42cbaae20f6
SHA1e8a5d53efee26fc2c74a9528da4c5c99d4212774
SHA25653ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b
SHA5122abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
2.2MB
MD507a27ce678e07245f97aea3ef3310005
SHA1475db932ef060ac59584b1130521ed0990c5a631
SHA2561c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651
SHA5123aa52830da5696f170c50d6359ebd222858ef1579e3aae4f78fd8c7705f8a351dad09918261a230e834894502a1bf2339d616d4546bc0f35571bdb82523aa60e
-
Filesize
2.2MB
MD507a27ce678e07245f97aea3ef3310005
SHA1475db932ef060ac59584b1130521ed0990c5a631
SHA2561c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651
SHA5123aa52830da5696f170c50d6359ebd222858ef1579e3aae4f78fd8c7705f8a351dad09918261a230e834894502a1bf2339d616d4546bc0f35571bdb82523aa60e
-
Filesize
2.2MB
MD507a27ce678e07245f97aea3ef3310005
SHA1475db932ef060ac59584b1130521ed0990c5a631
SHA2561c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651
SHA5123aa52830da5696f170c50d6359ebd222858ef1579e3aae4f78fd8c7705f8a351dad09918261a230e834894502a1bf2339d616d4546bc0f35571bdb82523aa60e
-
\Users\Admin\AppData\Local\Temp\._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
Filesize237KB
MD560b60c0077424578115f6075c88aaf7e
SHA178c633a8530623a234bc9faed0af8c5a61dd2589
SHA2568bbbcf41316eec589be4a7486747afaaec42b81f5689364d0fa30f48cf30ce2d
SHA51233f2f34e46887561158298a176795f684584d29e7152c420e2bf59d1a374768733c0d020cf0485b011b4b7f360c38ecc217dd4287ff407cb871fe4690b35686a
-
Filesize
237KB
MD560b60c0077424578115f6075c88aaf7e
SHA178c633a8530623a234bc9faed0af8c5a61dd2589
SHA2568bbbcf41316eec589be4a7486747afaaec42b81f5689364d0fa30f48cf30ce2d
SHA51233f2f34e46887561158298a176795f684584d29e7152c420e2bf59d1a374768733c0d020cf0485b011b4b7f360c38ecc217dd4287ff407cb871fe4690b35686a
-
\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
Filesize1.4MB
MD51aaccaee804f247a9efed42cbaae20f6
SHA1e8a5d53efee26fc2c74a9528da4c5c99d4212774
SHA25653ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b
SHA5122abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18
-
\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
Filesize1.4MB
MD51aaccaee804f247a9efed42cbaae20f6
SHA1e8a5d53efee26fc2c74a9528da4c5c99d4212774
SHA25653ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b
SHA5122abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18
-
\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
Filesize1.4MB
MD51aaccaee804f247a9efed42cbaae20f6
SHA1e8a5d53efee26fc2c74a9528da4c5c99d4212774
SHA25653ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b
SHA5122abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18
-
\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
Filesize1.4MB
MD51aaccaee804f247a9efed42cbaae20f6
SHA1e8a5d53efee26fc2c74a9528da4c5c99d4212774
SHA25653ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b
SHA5122abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18
-
\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
Filesize1.4MB
MD51aaccaee804f247a9efed42cbaae20f6
SHA1e8a5d53efee26fc2c74a9528da4c5c99d4212774
SHA25653ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b
SHA5122abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18
-
\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
Filesize1.4MB
MD51aaccaee804f247a9efed42cbaae20f6
SHA1e8a5d53efee26fc2c74a9528da4c5c99d4212774
SHA25653ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b
SHA5122abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18
-
\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
Filesize1.4MB
MD51aaccaee804f247a9efed42cbaae20f6
SHA1e8a5d53efee26fc2c74a9528da4c5c99d4212774
SHA25653ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b
SHA5122abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18
-
\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
Filesize1.4MB
MD51aaccaee804f247a9efed42cbaae20f6
SHA1e8a5d53efee26fc2c74a9528da4c5c99d4212774
SHA25653ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b
SHA5122abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18
-
Filesize
1.4MB
MD51aaccaee804f247a9efed42cbaae20f6
SHA1e8a5d53efee26fc2c74a9528da4c5c99d4212774
SHA25653ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b
SHA5122abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18
-
Filesize
1.4MB
MD51aaccaee804f247a9efed42cbaae20f6
SHA1e8a5d53efee26fc2c74a9528da4c5c99d4212774
SHA25653ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b
SHA5122abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18
-
Filesize
1.4MB
MD51aaccaee804f247a9efed42cbaae20f6
SHA1e8a5d53efee26fc2c74a9528da4c5c99d4212774
SHA25653ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b
SHA5122abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18
-
Filesize
1.4MB
MD51aaccaee804f247a9efed42cbaae20f6
SHA1e8a5d53efee26fc2c74a9528da4c5c99d4212774
SHA25653ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b
SHA5122abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18