Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3hetman_par...1).exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows10-2004-x64
3Hetman Par...ry.chm
windows10-2004-x64
1Hetman Par...ry.exe
windows10-2004-x64
6Resources/...nu.dll
windows10-2004-x64
1Resources/...nu.dll
windows10-2004-x64
1Resources/FileExt.dll
windows10-2004-x64
1Resources/LoadRAW.dll
windows10-2004-x64
3Resources/...DF.dll
windows10-2004-x64
3Resources/...rn.dll
windows10-2004-x64
3Resources/...mp.dll
windows10-2004-x64
1Resources/...ig.exe
windows10-2004-x64
1Resources/...0d.dll
windows10-2004-x64
3Resources/...tf.dll
windows10-2004-x64
1media_dll/SDL-2.dll
windows10-2004-x64
1media_dll/SDL.dll
windows10-2004-x64
1media_dll/...54.dll
windows10-2004-x64
3media_dll/...54.dll
windows10-2004-x64
1media_dll/...-3.dll
windows10-2004-x64
1media_dll/...54.dll
windows10-2004-x64
3media_dll/...52.dll
windows10-2004-x64
1media_dll/...-0.dll
windows10-2004-x64
3media_dll/...-2.dll
windows10-2004-x64
3Analysis
-
max time kernel
42s -
max time network
42s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 09:34
Static task
static1
Behavioral task
behavioral1
Sample
hetman_partition_recovery (1).exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Hetman Partition Recovery.chm
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
Hetman Partition Recovery.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Resources/DSKImageMenu.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
Resources/DiskMenu.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Resources/FileExt.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
Resources/LoadRAW.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Resources/MagicPDF.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral10
Sample
Resources/StarBurn.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Resources/magic_cmp.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
Resources/magic_jbig.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Resources/msvcr100d.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral14
Sample
Resources/wp_type1ttf.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
media_dll/SDL-2.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
media_dll/SDL.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
media_dll/avcodec-54.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
media_dll/avdevice-54.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
media_dll/avfilter-3.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
media_dll/avformat-54.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
media_dll/avutil-52.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral22
Sample
media_dll/swresample-0.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
media_dll/swscale-2.dll
Resource
win10v2004-20240226-en
General
-
Target
hetman_partition_recovery (1).exe
-
Size
14.4MB
-
MD5
2e38acafdd1217158022eb20bfb375dc
-
SHA1
9409779c5c5b1c435621fe092f1cdedd6cf0444e
-
SHA256
66e9f4d03e67dbcbd9d3a13bfc45b2c11e712b677e990e8ea1b405b60a3a40b2
-
SHA512
e6f8b3021fee20d4dfdda272f63ec4a23d61809b4b83b7fcfb8bcd8e7d3e554f7f103e14f748d060c2839fe537c04cf8a0f6dfa8244fcb570d8e6ba7e465201e
-
SSDEEP
393216:BI4dmkHNSQu2lFIEoLKjEGUln1jQdDSrzYlBEHZ:BJHNS7rEoLCP6BCfY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 456 Hetman Partition Recovery.exe -
Loads dropped DLL 9 IoCs
pid Process 324 hetman_partition_recovery (1).exe 5076 Regsvr32.exe 5076 Regsvr32.exe 4508 Regsvr32.exe 456 Hetman Partition Recovery.exe 456 Hetman Partition Recovery.exe 456 Hetman Partition Recovery.exe 456 Hetman Partition Recovery.exe 456 Hetman Partition Recovery.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: Hetman Partition Recovery.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Hetman Partition Recovery.exe -
Drops file in Program Files directory 43 IoCs
description ioc Process File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Language\Chinese.lng hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Language\Japanese.lng hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Language\common\Arabic.lng hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Language\common\Italian.lng hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Resources\msvcr100d.dll hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Resources\wp_type1ttf.dll hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\media_dll\swscale-2.dll hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Settings.ini hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Uninstall.exe hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Resources\LoadRAW.dll hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\media_dll\SDL.dll hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Language\Italian.lng hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Resources\FileExt.dll hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Resources\magic_jbig.exe hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Resources\DiskMenu.dll hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Language\Ukrainian.lng hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Language\French.lng hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Language\common\French.lng hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Language\common\Japanese.lng hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Resources\StarBurn.dll hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\media_dll\avcodec-54.dll hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Language\English.lng hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Hetman Partition Recovery.exe hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Language\Deutsch.lng hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Language\common\English.lng hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Language\common\Spanish.lng hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\media_dll\avfilter-3.dll hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\media_dll\avformat-54.dll hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Hetman Partition Recovery.chm hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Language\common\Chinese.lng hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Language\common\Ukrainian.lng hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Resources\DSKImageMenu.dll hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\media_dll\avutil-52.dll hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\media_dll\swresample-0.dll hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Language\Russian.lng hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Language\Spanish.lng hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Language\common\Deutsch.lng hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Language\common\Russian.lng hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Resources\MagicPDF.dll hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Resources\magic_cmp.dll hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\media_dll\SDL-2.dll hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\media_dll\avdevice-54.dll hetman_partition_recovery (1).exe File created C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Language\Arabic.lng hetman_partition_recovery (1).exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Modifies registry class 42 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66953641-5DA9-4A81-82E8-2727300BBD29}\InprocServer32 Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66953641-5DA9-4A81-82E8-2727300BBD29}\InprocServer32\ThreadingModel = "Apartment" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DiskMenu.Hetman Partition Recovery\ = "Recover Deleted Files" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Disk.Image.File Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HetmanPartitionRecovery hetman_partition_recovery (1).exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC3F9C94-A875-472A-BF45-9F1E8D660A91}\InprocServer32\ = "C:\\PROGRA~2\\HETMAN~1\\HETMAN~1.3\\RESOUR~1\\DSKIMA~1.DLL" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66953641-5DA9-4A81-82E8-2727300BBD29}\ = "Recover Deleted Files" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DiskMenu.Hetman Partition Recovery\Clsid Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Disk.Image.File\shell\Open\command Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Disk.Image.File\shell\Open\command\ = "\"C:\\Program Files (x86)\\Hetman Software\\Hetman Partition Recovery 2.3\\Hetman Partition Recovery.exe\" \"dsk_file %1\"" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Disk.Image.File\shellex Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC3F9C94-A875-472A-BF45-9F1E8D660A91}\ = "Mount to Hetman Partition Recovery" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC3F9C94-A875-472A-BF45-9F1E8D660A91}\InprocServer32 Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66953641-5DA9-4A81-82E8-2727300BBD29}\ProgID Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66953641-5DA9-4A81-82E8-2727300BBD29}\ProgID\ = "DiskMenu.Hetman Partition Recovery" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DSKImageMenu.Hetman Partition Recovery\ = "Mount to Hetman Partition Recovery" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Disk.Image.File\DefaultIcon\ = "C:\\Program Files (x86)\\Hetman Software\\Hetman Partition Recovery 2.3\\Resources\\FileExt.dll,0" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Disk.Image.File\shellex\ContextMenuHandlers\Hetman Partition Recovery Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC3F9C94-A875-472A-BF45-9F1E8D660A91}\InprocServer32\ThreadingModel = "Apartment" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66953641-5DA9-4A81-82E8-2727300BBD29}\InprocServer32\ = "C:\\PROGRA~2\\HETMAN~1\\HETMAN~1.3\\RESOUR~1\\DiskMenu.dll" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DiskMenu.Hetman Partition Recovery Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DSKImageMenu.Hetman Partition Recovery\Clsid\ = "{CC3F9C94-A875-472A-BF45-9F1E8D660A91}" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC3F9C94-A875-472A-BF45-9F1E8D660A91}\ProgID Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Disk.Image.File\shell\Open Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\Hetman Partition Recovery\ = "{66953641-5DA9-4A81-82E8-2727300BBD29}" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DSKImageMenu.Hetman Partition Recovery\Clsid Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC3F9C94-A875-472A-BF45-9F1E8D660A91}\ProgID\ = "DSKImageMenu.Hetman Partition Recovery" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HetmanPartitionRecovery\shell\open hetman_partition_recovery (1).exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.dsk Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HetmanPartitionRecovery\shell\open\command hetman_partition_recovery (1).exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\Hetman Partition Recovery Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.dsk\ = "Disk.Image.File" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Disk.Image.File\DefaultIcon Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Disk.Image.File\shellex\ContextMenuHandlers Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Disk.Image.File\shellex\ContextMenuHandlers\Hetman Partition Recovery\ = "{CC3F9C94-A875-472A-BF45-9F1E8D660A91}" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Disk.Image.File\shell Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HetmanPartitionRecovery\shell hetman_partition_recovery (1).exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\HetmanPartitionRecovery\shell\open\command\ = "C:\\Program Files (x86)\\Hetman Software\\Hetman Partition Recovery 2.3\\Hetman Partition Recovery.exe drive_%L" hetman_partition_recovery (1).exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC3F9C94-A875-472A-BF45-9F1E8D660A91} Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66953641-5DA9-4A81-82E8-2727300BBD29} Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DiskMenu.Hetman Partition Recovery\Clsid\ = "{66953641-5DA9-4A81-82E8-2727300BBD29}" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DSKImageMenu.Hetman Partition Recovery Regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4680 taskmgr.exe Token: SeSystemProfilePrivilege 4680 taskmgr.exe Token: SeCreateGlobalPrivilege 4680 taskmgr.exe Token: 33 4680 taskmgr.exe Token: SeIncBasePriorityPrivilege 4680 taskmgr.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 456 Hetman Partition Recovery.exe 456 Hetman Partition Recovery.exe 456 Hetman Partition Recovery.exe 456 Hetman Partition Recovery.exe 456 Hetman Partition Recovery.exe 456 Hetman Partition Recovery.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe 4680 taskmgr.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 456 Hetman Partition Recovery.exe 456 Hetman Partition Recovery.exe 456 Hetman Partition Recovery.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 324 wrote to memory of 5076 324 hetman_partition_recovery (1).exe 105 PID 324 wrote to memory of 5076 324 hetman_partition_recovery (1).exe 105 PID 324 wrote to memory of 5076 324 hetman_partition_recovery (1).exe 105 PID 324 wrote to memory of 4508 324 hetman_partition_recovery (1).exe 106 PID 324 wrote to memory of 4508 324 hetman_partition_recovery (1).exe 106 PID 324 wrote to memory of 4508 324 hetman_partition_recovery (1).exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\hetman_partition_recovery (1).exe"C:\Users\Admin\AppData\Local\Temp\hetman_partition_recovery (1).exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\SysWOW64\Regsvr32.exeRegsvr32 /s "C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Resources\DiskMenu.dll"2⤵
- Loads dropped DLL
- Modifies registry class
PID:5076
-
-
C:\Windows\SysWOW64\Regsvr32.exeRegsvr32 /s "C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Resources\DSKImageMenu.dll"2⤵
- Loads dropped DLL
- Modifies registry class
PID:4508
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4680
-
C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Hetman Partition Recovery.exe"C:\Program Files (x86)\Hetman Software\Hetman Partition Recovery 2.3\Hetman Partition Recovery.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4004 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:4084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.7MB
MD5e09c8dd9e4d4bedcbe03a1160cfb836c
SHA17542b3dafe46568bf249f19d20f2de87a1225969
SHA2569644692e5de69bd9d8567c81f1912feff1b4a86f1da812b98d5236196e26911a
SHA5122318c0e877ffef52aa23261c07b9592e70e0edd23d6cef43cfbc8974cbd954da11bcece9884ce7aef15c23aeaf86aeac83707b64fe51bddf3696c51090fa315f
-
Filesize
12.6MB
MD59bcf99f1a39d4f74d2935858c347e8f7
SHA183548f2ccf67f8cfd9494f83d3e9455f9b755898
SHA25688012c98272bf2b4aa4ae9f96bba8fac496da5d60ce6180207eaaf10cd780148
SHA51296e292d6e86d6262c736288aaea3294fe15cdabe8b8aeaae11268e38944933f71bf72e45f543a0c3d82df5e8c484b49a57b4651c8618637f61a0db9e35169d7a
-
Filesize
11.6MB
MD5190315ecb29f60b496a4907373e86c4e
SHA109ee1bb337cf14c077f1d7394da509b717bae57c
SHA2569da41bde6ca1ac97ad4a364fe3189dc3183daaf9d0aef8fb8bde16fde152ebb9
SHA5120825e3b2bdfe5b9c90b045adbf130468e485df95754b31bf34989976be2c1e87e88c214a5674267ff01209cb8e6a27f61e406129f4d5271209e30276221ace4a
-
Filesize
7KB
MD59ca01bbffa3d6cfed8830fb3018b350d
SHA155a631baf0a8cc3efb9c00127a5d0001ba5564a8
SHA25634c71e006778a53f29faf3d4070040c19d409c76a18b804bca21de5230dfc6a6
SHA5124a5d28920865fb4b29bf0e10ae4c4b5192347e69ae13a788e198fede9dd6dba706373fc43fd1649da3d23ec2f7d84c9874a75d6d95bb48c425f7410ef9151cfd
-
Filesize
17KB
MD54e98d7a0773c3e7b41620dfa54e69561
SHA11e3e6f7277bb685e9d1cb3a1e78fe665c47410b6
SHA25612a7b7c52ba15a0debf3fa4cef75e4b47a47a464d111029e8dfe7e0e3772a51f
SHA512dacbd58aa1f33199ebc454457cbbd757f6205a6c24a3368cb56f8ce029289cda0eadbfd41ce836f1b368bd6c09b81b9986daf9c8866d682e20dbec75241527ab
-
Filesize
440KB
MD56e7ca785db2b43c45558ac7666a3413e
SHA1c488648729538d312eb0f6114876e90336d3867b
SHA2563a7f8b923eaf6ab54299ffcb03b0d33b09e52a5f2297b029b0f931c9896a7ca6
SHA5121633e10d886d23604d8152a3299e6ed41658f5fff30ea581e2aee22695f010cda2059836c34135d67404026a30526a83f065b45cadf089180e623de253fcc2d8
-
Filesize
438KB
MD5bc8bd63d84cb79f3f5197f93ad66ebbd
SHA1aeebf9e0195a431c313c73800db40ae923d7ddd4
SHA256c732134c5d48d66c1dd2e5cf96e14f5effff4d75c2fc57d68822120d61fb663c
SHA5127212e410d9b38df3aa0a65ac6f3cb049acae67f7321f180c00eb85e74e422528b752fbffc237be6cf8a0bc2116bb35fe40be49b0b8e67df0870da9e3c747d210
-
Filesize
2.7MB
MD5d6483fac44e989285975f2f93e384ee4
SHA13ab591cc4b40c21926ce2e8d925082428cbdea3b
SHA256c13ecf30f5f377813465ffd1585802f7126a21b7246a2f84629a4b0d0d9f210a
SHA512861b95c9c21ac73848033111eeaee7079702fe00ddbb6c885fdd0b3403df88c5f063a2bdff482409c2bd5c308a88c098e357fa4001e9bbdc7621b3ca66efbab5
-
Filesize
754KB
MD5ce92db83bd93f52dfd41aed7db8c7ee3
SHA1ee975849efc8caff9996d31466c1860d0128e3d2
SHA2564e47378461d096d99c2fa59c93a95822341990655141f67b2e298dc0028a81e3
SHA5124a55255bf65f143e19da42b43b801690f512789b189a57392764e5f83a965f89ed7b77072b8f4ebff2152f52baa6b7c080240665efccfbfb26bf9633f9263c0f
-
Filesize
735KB
MD5ab15f2fa750b56a6acb12081975325ac
SHA10781fdc03e1d0831b0f8d6a6365a0a6d8c26ca5d
SHA256ac93fb3b7c4fd2a8f0cc8a1760e55cc50019e6dbf04c7d78caa2e017ba62f555
SHA512d2c3a8616f4ebff17e6449170186a2e04ac50677ad7b27ab3f2bd2a67ec91dda94ffeadcd86b8553d747dee4854928ad854e9ed6043b123a541ddbbe62870b30
-
Filesize
1KB
MD5a7ad7e678b857b7fe5ec815e80326c9e
SHA17355efccc2c2c4bb55b7eab942a1faf38c310be3
SHA2564126c46bb0610e6cef3082c1f29fc6afc8af51abf20d707d74d23d077c661d71
SHA512092a67fc50a6d2fcf261db38627178a1e248bf1a1e96ebd77c2b8749743c647a43c2b2c2c6c266be4d5e3fa8ae65cf5b4e30b4439859bf681713d8ea0854e5de
-
Filesize
15KB
MD589351a0a6a89519c86c5531e20dab9ea
SHA19e801aaaae9e70d8f7fc52f6f12cedc55e4c8a00
SHA256f530069ef87a1c163c4fd63a3d5b053420ce3d7a98739c70211b4a99f90d6277
SHA51213168fa828b581383e5f64d3b54be357e98d2eb9362b45685e7426ffc2f0696ab432cc8a3f374ce8abd03c096f1662d954877afa886fc4aa74709e6044b75c08
-
Filesize
1KB
MD50a72818b828b4251f6a1fb3336124a79
SHA1355bf811ad4d752bdcdee3ccaf0aaaa456a37b23
SHA256105bf24a632c945d40ee96989af54e2406d02aaf5fca05fbe19612e0d5fae68a
SHA5123eb122f72b7000e8ef82657200ad5b7bc3ee892769d3d8eab068a95c42c4fa412af4b431d2c5f70ef4aeba808fe7db0c3c24fd104cdd0f8700a4444404f5aa48
-
Filesize
1KB
MD576a0c88892f11fe7f90cd075d4ac3693
SHA1cdf45b0b1a7c8ad76eaa2839dde7b2bad6eab0c5
SHA25667646a88446fd9962bc67970485bf10fb924ddf058e2c8bed14b3b340da52c48
SHA5122fbe63cc528a599fabb1d449b2b64c0e40a5edca973d7fb0e2de19f12bcd8248669a1be6ce166fdb3ec947584a481143e57b4ab77a0873b81b029b265061b785
-
Filesize
1KB
MD5cceb6aa8f48fbc82b4e843a972db650a
SHA1c132f3ae014668901388556f8029e6796eef3e35
SHA2567cd16b428bd8e4c09e13bfe5b32f4bbcf6dfe8a74a21e75bd384151518f975e2
SHA5128a77f8a0f5325259ddc37cec9af4d8f006e75a11f7cc1379c4326a5f0c4016464d003972568df9677adfe27cbdebc002e303a3a0c2d96556af2ed91f779f69dd
-
Filesize
1KB
MD5159712303bd835146fc137da9660fdd9
SHA19bd70f29f93b68a4fb97bf0509dd5597b157041d
SHA2563eb46c76d1541654ed4effd124e38fb81077051fd83d2e2f4bf67dbc86c1532d
SHA5129d6b055c82925e22cacbd3e1535c83078f29f0bb4d0dc3eeeacf99e47a39b09511802c019508aec61b8ca4106a65587644bd4a1489888d9d71b9f44495817e0b
-
Filesize
1KB
MD530b3698ea0fbdd5aaf9010740151f58a
SHA149949acc40370fc4b6fd19f24cfa79a6db728ae1
SHA2569ffe9048473c9067d54123017720e7096d1e5d8e50afbc1546802c95a42f13e1
SHA512b2e13d928eec4106b502d191dd6509843b16c183992ce53ba144a04fbe465e309a35c8398aea68d94cf2eb541cad078e83426f5ff6ed898add1d423b2105ec94