Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
b9f831693fc6fb65eb0eb23278f2c8f7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9f831693fc6fb65eb0eb23278f2c8f7.exe
Resource
win10v2004-20240226-en
General
-
Target
b9f831693fc6fb65eb0eb23278f2c8f7.exe
-
Size
2.1MB
-
MD5
b9f831693fc6fb65eb0eb23278f2c8f7
-
SHA1
4f4f0fa6e66a4c007d6d659f776c3c69978c1d37
-
SHA256
79f4f0ee684cd9effc344b0222ba84eac1f5ffb64709e3bbccff9c666908cccd
-
SHA512
2e150487a3292d4a7c53dbf1534d793f2d69c32e2b54e9b3f223368ca75b2577cd296e957a99a3b86f06a276ed97a9ade586d13b204fa46bb4022569e04edfe5
-
SSDEEP
49152:ZxE2Mfc8xmN3Aek03noj45wlDTKqnstLet3Lyo:TbeUJF3noxDeqnstLE7
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" b9f831693fc6fb65eb0eb23278f2c8f7.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf b9f831693fc6fb65eb0eb23278f2c8f7.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\com\comrepl.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\SysWOW64\com\MigRegDB.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\SmartTagInstall.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Program Files\Java\jre7\bin\javacpl.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Program Files\Java\jre7\bin\keytool.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Program Files\Java\jre7\bin\policytool.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files (x86)\Windows Media Player\WMPDMC.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Program Files\Java\jre7\bin\klist.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\assembly\NativeImages_v2.0.50727_32\PresentationFontCac#\b3ade8d5c0d4bb5d4940bcafd3453642\PresentationFontCache.ni.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\ehome\ehrec.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\ComSvcConfig\5f1a06c0108b2c81cde1dc491d74043d\ComSvcConfig.ni.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ComSvcConfig.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.5\WFServicesReg.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\assembly\GAC_32\ehexthost32\6.1.0.0__31bf3856ad364e35\ehexthost32.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Windows\assembly\GAC_64\mcupdate\6.1.0.0__31bf3856ad364e35\mcupdate.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Windows\assembly\GAC_MSIL\dfsvc\2.0.0.0__b03f5f7f11d50a3a\dfsvc.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\PresentationFontCac#\b3ade8d5c0d4bb5d4940bcafd3453642\PresentationFontCache.ni.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\PresentationFontCac#\b3ade8d5c0d4bb5d4940bcafd3453642\PresentationFontCache.ni.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\ehExtHost\ad37b6e3a1cb1081592f1c5797ae9dad\ehExtHost.ni.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\SMSvcHost\e88db1688b08fbb889b0b9d4b1a51493\SMSvcHost.ni.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\infocard.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Windows\Microsoft.NET\Framework\v3.0\WPF\XamlViewer\XamlViewer_v0300.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.5\AddInProcess32.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\ServiceModelReg.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\regtlibv12.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\PresentationFontCac#\0246845f487e5f33d3564eff578665a3\PresentationFontCache.ni.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\WsatConfig\36ca2928b2191011831ab673861c6ac6\WsatConfig.ni.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\SMSvcHost\0b4d4e172e8054cb61d27f5ab9e0e445\SMSvcHost.ni.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\WsatConfig\9683999d889dc0b8782c782e2fc1aee5\WsatConfig.ni.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\ehome\ehexthost.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Ldr64.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\LoadMxf\d09b54cd68bc772b3be3832926e940d4\LoadMxf.ni.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\EdmGen.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regtlibv12.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Boot\PCAT\memtest.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Windows\Microsoft.NET\NETFXRepair.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Narrator\6.1.0.0__31bf3856ad364e35\Narrator.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.0\WPF\XamlViewer\XamlViewer_v0300.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_state.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ilasm.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Installer\{90140000-0011-0000-0000-0000000FF1CE}\msouc.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Workflow.Compiler\v4.0_4.0.0.0__31bf3856ad364e35\Microsoft.Workflow.Compiler.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.5\EdmGen.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Installer\{90140000-0011-0000-0000-0000000FF1CE}\oisicon.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Installer\{90140000-0011-0000-0000-0000000FF1CE}\outicon.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\dfsvc\9bc0d921859b039d6e9f642148333949\dfsvc.ni.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File created C:\Windows\assembly\GAC_MSIL\PresentationFontCache\3.0.0.0__31bf3856ad364e35\PresentationFontCache.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe$ b9f831693fc6fb65eb0eb23278f2c8f7.exe File opened for modification C:\Windows\assembly\GAC_32\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe b9f831693fc6fb65eb0eb23278f2c8f7.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf b9f831693fc6fb65eb0eb23278f2c8f7.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2256 b9f831693fc6fb65eb0eb23278f2c8f7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9f831693fc6fb65eb0eb23278f2c8f7.exe"C:\Users\Admin\AppData\Local\Temp\b9f831693fc6fb65eb0eb23278f2c8f7.exe"1⤵
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:2256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5a471ff2600ce6d9b8bf370b6e0631a25
SHA1994769add17b2212235440ab5a0800aaa967a97b
SHA2566cf06f46392bc5c4f3c229774ac0f301f91d2761d086ba1c80483328fb4f42d7
SHA5121551a22e9f87810e0cfbbc5e41753b7b0d5d24f8c1522366eff6b1217d84a793effcecbbfd6471517d06b98a0d7a7401bed6aace27f0fbfc114ce38f533d7991