Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
201s -
max time network
40s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 14:56
Static task
static1
Behavioral task
behavioral1
Sample
773ad14bd9e7e2fbb5f76cf6ebfc8224.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
773ad14bd9e7e2fbb5f76cf6ebfc8224.exe
Resource
win10v2004-20231215-en
General
-
Target
773ad14bd9e7e2fbb5f76cf6ebfc8224.exe
-
Size
746KB
-
MD5
773ad14bd9e7e2fbb5f76cf6ebfc8224
-
SHA1
e809f9bff7b24ae387475381cd06b5d73516327f
-
SHA256
49d45a60bc679dd8205b6653bb9e36b20904ed76c2ff245b7204b668e5952663
-
SHA512
523921f6e6357276b998fdbba97b405629bf8138eeaa98c0e482c39ee9817220db6eeba93a6acaee99d6980968464cf635147cfc472ed8bb1689bb702c3199c6
-
SSDEEP
12288:uYd+DN2QzXqUgYVhLLNO931vK1ifzNvZA4VVvHd+Lck5BLZrtDp/HeEikYL6DZj1:LIEQzXXLLq3RMEvpHkLd5ZZNp/H9izWP
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6} Google.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6} Google.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe restart" Google.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe restart" Google.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6}\StubPath = "C:\\Windows\\system32\\Google Chrome\\Google.exe restart" 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe restart" Google.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe restart" Google.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe restart" Google.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6} Google.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe restart" Google.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6} 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6} Google.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6} Google.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6} Google.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6} Google.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6} Google.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6} Google.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe restart" Google.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6}\StubPath = "C:\\Windows\\system32\\Google Chrome\\Google.exe restart" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe restart" Google.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe restart" Google.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6} Google.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{RPJ3M73V-345F-M807-65QB-4N6N2X13CEM6}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe restart" Google.exe -
Deletes itself 1 IoCs
pid Process 1784 svchost.exe -
Executes dropped EXE 30 IoCs
pid Process 2488 Google.exe 1544 Google.exe 3048 Google.exe 2452 Google.exe 2876 Google.exe 1540 Google.exe 2212 Google.exe 2768 Google.exe 2588 Google.exe 2540 Google.exe 1584 Google.exe 2868 Google.exe 1792 Google.exe 1992 Google.exe 1936 Google.exe 1532 Google.exe 2772 Google.exe 1364 Google.exe 764 Google.exe 2248 Google.exe 2752 Google.exe 2560 Google.exe 2576 Google.exe 2544 Google.exe 2884 Google.exe 2508 Google.exe 596 Google.exe 1492 Google.exe 2260 Google.exe 2132 Google.exe -
Loads dropped DLL 20 IoCs
pid Process 324 svchost.exe 324 svchost.exe 324 svchost.exe 324 svchost.exe 324 svchost.exe 324 svchost.exe 324 svchost.exe 324 svchost.exe 324 svchost.exe 324 svchost.exe 324 svchost.exe 324 svchost.exe 324 svchost.exe 324 svchost.exe 324 svchost.exe 324 svchost.exe 324 svchost.exe 324 svchost.exe 324 svchost.exe 324 svchost.exe -
resource yara_rule behavioral1/memory/1572-27-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/1572-32-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/1572-30-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/1572-38-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/1572-39-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/1572-40-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/1784-44-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/1572-49-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/324-48-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/1572-50-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/2964-105-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/324-145-0x00000000023F0000-0x00000000024B0000-memory.dmp upx behavioral1/memory/1948-170-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/2572-232-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/2536-295-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/632-356-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/2396-417-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/3068-481-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/772-542-0x0000000010000000-0x000000001031C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 35 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\Google Chrome\\Google.exe" 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\Google Chrome\\Google.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\Google Chrome\\Google.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Local\\Temp\\773ad14bd9e7e2fbb5f76cf6ebfc8224.exe" 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\Google Chrome\\Google.exe" 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\Google Chrome\\Google.exe" Google.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\Google Chrome\\Google.exe" Google.exe -
Drops file in System32 directory 13 IoCs
description ioc Process File created C:\Windows\SysWOW64\Google Chrome\Google.exe Google.exe File created C:\Windows\SysWOW64\Google Chrome\Google.exe svchost.exe File created C:\Windows\SysWOW64\Google Chrome\Google.exe Google.exe File created C:\Windows\SysWOW64\Google Chrome\Google.exe Google.exe File created C:\Windows\SysWOW64\Google Chrome\Google.exe 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe File created C:\Windows\SysWOW64\Google Chrome\Google.exe Google.exe File created C:\Windows\SysWOW64\Google Chrome\Google.exe Google.exe File created C:\Windows\SysWOW64\Google Chrome\Google.exe Google.exe File created C:\Windows\SysWOW64\Google Chrome\Google.exe Google.exe File opened for modification C:\Windows\SysWOW64\Google Chrome\Google.exe 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe File created C:\Windows\SysWOW64\Google Chrome\Google.exe Google.exe File created C:\Windows\SysWOW64\Google Chrome\Google.exe Google.exe File created C:\Windows\SysWOW64\Google Chrome\Google.exe Google.exe -
Suspicious use of SetThreadContext 22 IoCs
description pid Process procid_target PID 2696 set thread context of 2728 2696 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 29 PID 2728 set thread context of 1572 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 31 PID 2488 set thread context of 1544 2488 Google.exe 36 PID 1544 set thread context of 3048 1544 Google.exe 39 PID 2452 set thread context of 2876 2452 Google.exe 42 PID 2876 set thread context of 1540 2876 Google.exe 45 PID 2212 set thread context of 2768 2212 Google.exe 48 PID 2768 set thread context of 2588 2768 Google.exe 51 PID 2540 set thread context of 1584 2540 Google.exe 54 PID 1584 set thread context of 2868 1584 Google.exe 57 PID 1792 set thread context of 1992 1792 Google.exe 60 PID 1992 set thread context of 1936 1992 Google.exe 62 PID 1532 set thread context of 2772 1532 Google.exe 66 PID 2772 set thread context of 1364 2772 Google.exe 68 PID 764 set thread context of 2248 764 Google.exe 72 PID 2248 set thread context of 2752 2248 Google.exe 74 PID 2560 set thread context of 2576 2560 Google.exe 78 PID 2576 set thread context of 2544 2576 Google.exe 81 PID 2884 set thread context of 2508 2884 Google.exe 84 PID 2508 set thread context of 596 2508 Google.exe 87 PID 1492 set thread context of 2260 1492 Google.exe 90 PID 2260 set thread context of 2132 2260 Google.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 1544 Google.exe 2876 Google.exe 2768 Google.exe 1584 Google.exe 1992 Google.exe 2772 Google.exe 2248 Google.exe 2576 Google.exe 2508 Google.exe 2260 Google.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1572 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 3048 Google.exe 1540 Google.exe 2588 Google.exe 2868 Google.exe 1936 Google.exe 1364 Google.exe 2752 Google.exe 2544 Google.exe 596 Google.exe 2132 Google.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2728 2696 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 29 PID 2696 wrote to memory of 2728 2696 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 29 PID 2696 wrote to memory of 2728 2696 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 29 PID 2696 wrote to memory of 2728 2696 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 29 PID 2696 wrote to memory of 2728 2696 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 29 PID 2696 wrote to memory of 2728 2696 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 29 PID 2696 wrote to memory of 2728 2696 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 29 PID 2696 wrote to memory of 2728 2696 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 29 PID 2696 wrote to memory of 2728 2696 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 29 PID 2696 wrote to memory of 2728 2696 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 29 PID 2696 wrote to memory of 2728 2696 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 29 PID 2696 wrote to memory of 2728 2696 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 29 PID 2696 wrote to memory of 2728 2696 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 29 PID 2728 wrote to memory of 1796 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 30 PID 2728 wrote to memory of 1796 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 30 PID 2728 wrote to memory of 1796 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 30 PID 2728 wrote to memory of 1796 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 30 PID 2728 wrote to memory of 1796 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 30 PID 2728 wrote to memory of 1796 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 30 PID 2728 wrote to memory of 1796 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 30 PID 2728 wrote to memory of 1648 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 32 PID 2728 wrote to memory of 1648 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 32 PID 2728 wrote to memory of 1648 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 32 PID 2728 wrote to memory of 1648 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 32 PID 2728 wrote to memory of 1648 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 32 PID 2728 wrote to memory of 1648 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 32 PID 2728 wrote to memory of 1648 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 32 PID 2728 wrote to memory of 1572 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 31 PID 2728 wrote to memory of 1572 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 31 PID 2728 wrote to memory of 1572 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 31 PID 2728 wrote to memory of 1572 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 31 PID 2728 wrote to memory of 1572 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 31 PID 2728 wrote to memory of 1572 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 31 PID 2728 wrote to memory of 1572 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 31 PID 2728 wrote to memory of 1572 2728 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 31 PID 1572 wrote to memory of 1784 1572 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 33 PID 1572 wrote to memory of 1784 1572 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 33 PID 1572 wrote to memory of 1784 1572 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 33 PID 1572 wrote to memory of 1784 1572 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 33 PID 1572 wrote to memory of 1784 1572 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 33 PID 1572 wrote to memory of 324 1572 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 34 PID 1572 wrote to memory of 324 1572 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 34 PID 1572 wrote to memory of 324 1572 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 34 PID 1572 wrote to memory of 324 1572 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 34 PID 1572 wrote to memory of 324 1572 773ad14bd9e7e2fbb5f76cf6ebfc8224.exe 34 PID 324 wrote to memory of 2488 324 svchost.exe 35 PID 324 wrote to memory of 2488 324 svchost.exe 35 PID 324 wrote to memory of 2488 324 svchost.exe 35 PID 324 wrote to memory of 2488 324 svchost.exe 35 PID 2488 wrote to memory of 1544 2488 Google.exe 36 PID 2488 wrote to memory of 1544 2488 Google.exe 36 PID 2488 wrote to memory of 1544 2488 Google.exe 36 PID 2488 wrote to memory of 1544 2488 Google.exe 36 PID 2488 wrote to memory of 1544 2488 Google.exe 36 PID 2488 wrote to memory of 1544 2488 Google.exe 36 PID 2488 wrote to memory of 1544 2488 Google.exe 36 PID 2488 wrote to memory of 1544 2488 Google.exe 36 PID 2488 wrote to memory of 1544 2488 Google.exe 36 PID 2488 wrote to memory of 1544 2488 Google.exe 36 PID 2488 wrote to memory of 1544 2488 Google.exe 36 PID 2488 wrote to memory of 1544 2488 Google.exe 36 PID 2488 wrote to memory of 1544 2488 Google.exe 36 PID 1544 wrote to memory of 1940 1544 Google.exe 37 PID 1544 wrote to memory of 1940 1544 Google.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\773ad14bd9e7e2fbb5f76cf6ebfc8224.exe"C:\Users\Admin\AppData\Local\Temp\773ad14bd9e7e2fbb5f76cf6ebfc8224.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\773ad14bd9e7e2fbb5f76cf6ebfc8224.exeC:\Users\Admin\AppData\Local\Temp\773ad14bd9e7e2fbb5f76cf6ebfc8224.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\773ad14bd9e7e2fbb5f76cf6ebfc8224.exeC:\Users\Admin\AppData\Local\Temp\773ad14bd9e7e2fbb5f76cf6ebfc8224.exe3⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- Deletes itself
PID:1784
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\system32\Google Chrome\Google.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\SysWOW64\Google Chrome\Google.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1940
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:2044
-
-
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\SysWOW64\Google Chrome\Google.exe"7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:3048 -
C:\Windows\SysWOW64\svchost.exesvchost.exe8⤵PID:2964
-
-
-
-
-
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\system32\Google Chrome\Google.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2452 -
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\SysWOW64\Google Chrome\Google.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2876 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:2900
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:2996
-
-
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\SysWOW64\Google Chrome\Google.exe"7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1540 -
C:\Windows\SysWOW64\svchost.exesvchost.exe8⤵PID:1948
-
-
-
-
-
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\system32\Google Chrome\Google.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2212 -
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\SysWOW64\Google Chrome\Google.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2768 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:2668
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:2820
-
-
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\SysWOW64\Google Chrome\Google.exe"7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2588 -
C:\Windows\SysWOW64\svchost.exesvchost.exe8⤵PID:2572
-
-
-
-
-
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\system32\Google Chrome\Google.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2540 -
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\SysWOW64\Google Chrome\Google.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1584 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:2468
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1960
-
-
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\SysWOW64\Google Chrome\Google.exe"7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2868 -
C:\Windows\SysWOW64\svchost.exesvchost.exe8⤵PID:2536
-
-
-
-
-
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\system32\Google Chrome\Google.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1792 -
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\SysWOW64\Google Chrome\Google.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1992 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1300
-
-
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\SysWOW64\Google Chrome\Google.exe"7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1936 -
C:\Windows\SysWOW64\svchost.exesvchost.exe8⤵PID:632
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1760
-
-
-
-
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\system32\Google Chrome\Google.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1532 -
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\SysWOW64\Google Chrome\Google.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2772 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1640
-
-
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\SysWOW64\Google Chrome\Google.exe"7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1364 -
C:\Windows\SysWOW64\svchost.exesvchost.exe8⤵PID:2396
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1576
-
-
-
-
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\system32\Google Chrome\Google.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:764 -
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\SysWOW64\Google Chrome\Google.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2248 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:2760
-
-
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\SysWOW64\Google Chrome\Google.exe"7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2752 -
C:\Windows\SysWOW64\svchost.exesvchost.exe8⤵PID:3068
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:2756
-
-
-
-
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\system32\Google Chrome\Google.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2560 -
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\SysWOW64\Google Chrome\Google.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2576 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1592
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:2548
-
-
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\SysWOW64\Google Chrome\Google.exe"7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2544 -
C:\Windows\SysWOW64\svchost.exesvchost.exe8⤵PID:772
-
-
-
-
-
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\system32\Google Chrome\Google.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2884 -
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\SysWOW64\Google Chrome\Google.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2508 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:784
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1964
-
-
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\SysWOW64\Google Chrome\Google.exe"7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:596 -
C:\Windows\SysWOW64\svchost.exesvchost.exe8⤵PID:1116
-
-
-
-
-
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\system32\Google Chrome\Google.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1492 -
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\SysWOW64\Google Chrome\Google.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2260 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:440
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:2088
-
-
C:\Windows\SysWOW64\Google Chrome\Google.exe"C:\Windows\SysWOW64\Google Chrome\Google.exe"7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2132 -
C:\Windows\SysWOW64\svchost.exesvchost.exe8⤵PID:312
-
-
-
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
746KB
MD556340cd04defaa4856f35103d6d74c8b
SHA16eeba342ba1bc0f6b8ad068c82292dfffc0a8416
SHA256f120f4e2dd708e5a08566773344d7c89a476ae87be76627ec8e9f8b4e8fe93f7
SHA5124603e45fe8d619094ef0a2ff26f00c67216ef23527b00786f8412450c006b4d5fa51724eab1941f20aecd61deb8bbe696e276d8df17ce323d323bb5f74b606f3
-
Filesize
746KB
MD5ccad4d183ad673d2bdf722545a8793bd
SHA192afb0771c36dcab6c59abf915f9bb0aa720fd4c
SHA25670bdb7df57d4bd48443a2af73a20b65ae4759d97a218a92109afe20565de7e34
SHA5120577fd7ef53f209bf3ce791c97e79b23101dfa9864f7e85844ffd6e50a41a4e92c330e070cf3a1101126bd3a447881ab789624077130d4689045aa7e60b2a8ca
-
Filesize
746KB
MD5773ad14bd9e7e2fbb5f76cf6ebfc8224
SHA1e809f9bff7b24ae387475381cd06b5d73516327f
SHA25649d45a60bc679dd8205b6653bb9e36b20904ed76c2ff245b7204b668e5952663
SHA512523921f6e6357276b998fdbba97b405629bf8138eeaa98c0e482c39ee9817220db6eeba93a6acaee99d6980968464cf635147cfc472ed8bb1689bb702c3199c6
-
Filesize
448KB
MD55fd90e2b4ad4ecb972a89d2092b21a04
SHA1ea530f94bfa270b933c5ba6d43ac34b66b52b7e6
SHA256c175ad62847e09a6341d104e8802a172e16f9f6578aa9fec457d0164271dfbec
SHA51288cefa6a20ac2e57b3ca3677428a1273144d60e190285d9d61f814bd0e4a9a5c1c985d3e2f5f36526e523b604bfb1a095c7da45fd79baa65614be3bdced579d3