Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 19:43
Static task
static1
Behavioral task
behavioral1
Sample
b5844507e6b37038884dd1f0a674e1c9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b5844507e6b37038884dd1f0a674e1c9.exe
Resource
win10v2004-20240226-en
General
-
Target
b5844507e6b37038884dd1f0a674e1c9.exe
-
Size
821KB
-
MD5
b5844507e6b37038884dd1f0a674e1c9
-
SHA1
abcf9e3b1f75450e8dde452840a66c0c39ba5fa0
-
SHA256
1c81c5c39a086d485a556c626303153a8125e2f28b638a23b7f3ea79784dbc3e
-
SHA512
c98690149a0588a13f044700fc6bb58faac37de1bab408bbf026260cd4654499f07c8dbd5861c0b6ab660f0d9397fbd6f6ffa86098e9f6e0f19a21c84eda2303
-
SSDEEP
6144:ntaHta+2dMQRcR0FZXpWEFx2x/MEuzzcxeT0IJCkaZ1M/IabjKoh9WqrY:8c0QRlHFLEuzYxHIsvM/IabjKoh9WqrY
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" b5844507e6b37038884dd1f0a674e1c9.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf b5844507e6b37038884dd1f0a674e1c9.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\migwiz\PostMig.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\CertEnrollCtrl.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\printui.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\tcmsetup.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\com\MigRegDB.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\AdapterTroubleshooter.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\help.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\choice.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\ddodiag.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\icsunattend.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\makecab.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\RpcPing.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\typeperf.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\compact.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\RMActivate_ssp.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\user.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\IME\IMEJP10\imjpuexc.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\dllhst3g.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\fontview.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\gpscript.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\PresentationHost.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\rdrleakdiag.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\com\comrepl.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\netbtugc.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\setupSNK.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\taskeng.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\iscsicpl.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\SecEdit.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\SystemPropertiesRemote.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\regini.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\SystemPropertiesDataExecutionPrevention.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\wbem\WMIC.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\ARP.EXE b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\certreq.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\dvdupgrd.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\mshta.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\newdev.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\certutil.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\findstr.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\regsvr32.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\shrpubw.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\SyncHost.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\logman.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\psr.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\cttunesvr.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\extrac32.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\gpresult.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\print.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\rasautou.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\runas.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\comp.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\getmac.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\RMActivate_isv.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\autochk.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\ftp.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\rundll32.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\InstallShield\setup.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\diantz.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\driverquery.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\cmmon32.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\dllhost.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\SndVol.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\upnpcont.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\SysWOW64\Dism\DismHost.exe b5844507e6b37038884dd1f0a674e1c9.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmprph.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\OSPPREARM.EXE b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Program Files\Java\jre7\bin\servertool.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Program Files\Java\jre7\bin\unpack200.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Program Files\Java\jre7\bin\java.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE$ b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLED.EXE$ b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INFOPATH.EXE b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Program Files\7-Zip\Uninstall.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Program Files\Java\jre7\bin\ssvagent.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Windows Media Player\wmpshare.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\Wkconv.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Program Files\Java\jre7\bin\javaw.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE$ b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Program Files\7-Zip\7zFM.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\vsta_ep32.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\misc.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe$ b5844507e6b37038884dd1f0a674e1c9.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\MSBuild\b93c627ec2e15c2675bcc81edafb10be\MSBuild.ni.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\assembly\GAC_64\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\ehExtHost32\c899de3549784161aa66610d5735e4f0\ehExtHost32.ni.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\mcupdate\f30beba36940b5a2b55a32ea7f42d694\mcupdate.ni.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\aspnet_state.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Narrator\6.1.0.0__31bf3856ad364e35\Narrator.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\ehome\McrMgr.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\ComSvcConfig\2bd538d545e15452202ef3b41080e2ce\ComSvcConfig.ni.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\ehome\ehsched.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regsql.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Windows\assembly\GAC_MSIL\ComSvcConfig\3.0.0.0__b03f5f7f11d50a3a\ComSvcConfig.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ilasm.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\servicing\TrustedInstaller.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\EdmGen.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\WsatConfig.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\dfsvc\9bc0d921859b039d6e9f642148333949\dfsvc.ni.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\ehExtHost\ad37b6e3a1cb1081592f1c5797ae9dad\ehExtHost.ni.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\WsatConfig\9683999d889dc0b8782c782e2fc1aee5\WsatConfig.ni.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\NETFXRepair.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Workflow.Compiler\v4.0_4.0.0.0__31bf3856ad364e35\Microsoft.Workflow.Compiler.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\assembly\GAC_32\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\assembly\GAC_MSIL\loadmxf\6.1.0.0__31bf3856ad364e35\loadmxf.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\assembly\GAC_32\ehexthost32\6.1.0.0__31bf3856ad364e35\ehexthost32.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Windows\assembly\GAC_MSIL\dfsvc\2.0.0.0__b03f5f7f11d50a3a\dfsvc.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\SMSvcHost\0b4d4e172e8054cb61d27f5ab9e0e445\SMSvcHost.ni.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\ehome\ehvid.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\WsatConfig\96a8bdafba9f9d3e33cd974bfaa67e58\WsatConfig.ni.exe b5844507e6b37038884dd1f0a674e1c9.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\aspnet_wp.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\assembly\GAC_MSIL\SMSvcHost\3.0.0.0__b03f5f7f11d50a3a\SMSvcHost.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\assembly\GAC_MSIL\WsatConfig\3.0.0.0__b03f5f7f11d50a3a\WsatConfig.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\dfsvc.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe$ b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe b5844507e6b37038884dd1f0a674e1c9.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.5\AddInUtil.exe b5844507e6b37038884dd1f0a674e1c9.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf b5844507e6b37038884dd1f0a674e1c9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2492 b5844507e6b37038884dd1f0a674e1c9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5844507e6b37038884dd1f0a674e1c9.exe"C:\Users\Admin\AppData\Local\Temp\b5844507e6b37038884dd1f0a674e1c9.exe"1⤵
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:2492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD52b51c75ab4fb7011621338b0250bf86a
SHA13d2ab61a209819942f89b56f09988a0278b80f5c
SHA256649324df9226a9b7eb2f786298e1da491dbca1d19199bc7fd3d5b8190c9c2283
SHA5126edea4574da8a9bc63d2889c55a41d1d1939ef34f7c4f6c2249b6cc7b5668afffbf50b37dae82eb1c928a8c6683dffd0c9dcda9a54391bd9be7c63e0d2429b39