Analysis
-
max time kernel
19s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 18:22
Static task
static1
Behavioral task
behavioral1
Sample
batch.bat
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
batch.bat
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
batch.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
batch.bat
Resource
win11-20240221-en
General
-
Target
batch.bat
-
Size
272B
-
MD5
e9ae15070c337f65b6dd0fe80a0cceab
-
SHA1
7f810dcddae3194e03b2d824bfd7d5b7293344a9
-
SHA256
68276e0cf0b2a61219f8cad7c8632b265aa40e63ee2e9269fa2645fcd546039c
-
SHA512
4efc7399e1d95498669fafd5ad04092f9dc2603962b00dbbea4dd6ad88eb1a42ac81de280dac15a5e3496a35d238331dfccc23484856f1de95f3b1fe2db0d6ea
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" EXCEL.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1588 WINWORD.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 3 IoCs
pid Process 2612 EXCEL.EXE 1588 WINWORD.EXE 2716 POWERPNT.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2376 chrome.exe 2376 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2716 POWERPNT.EXE -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 2376 chrome.exe Token: SeShutdownPrivilege 2376 chrome.exe Token: SeShutdownPrivilege 2376 chrome.exe Token: SeShutdownPrivilege 2376 chrome.exe Token: SeShutdownPrivilege 2376 chrome.exe Token: SeShutdownPrivilege 2376 chrome.exe Token: SeShutdownPrivilege 2376 chrome.exe Token: SeShutdownPrivilege 2376 chrome.exe Token: SeShutdownPrivilege 2376 chrome.exe Token: SeShutdownPrivilege 2376 chrome.exe Token: SeShutdownPrivilege 2376 chrome.exe Token: SeShutdownPrivilege 2376 chrome.exe Token: SeShutdownPrivilege 2376 chrome.exe Token: SeShutdownPrivilege 2376 chrome.exe Token: SeShutdownPrivilege 2376 chrome.exe Token: SeShutdownPrivilege 2376 chrome.exe Token: SeShutdownPrivilege 2376 chrome.exe Token: SeShutdownPrivilege 2376 chrome.exe Token: SeShutdownPrivilege 2376 chrome.exe Token: SeShutdownPrivilege 2376 chrome.exe Token: SeShutdownPrivilege 2376 chrome.exe Token: SeShutdownPrivilege 2376 chrome.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 1588 WINWORD.EXE 2612 EXCEL.EXE 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2612 EXCEL.EXE 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 1588 WINWORD.EXE -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe 2376 chrome.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2612 EXCEL.EXE 1588 WINWORD.EXE 2612 EXCEL.EXE 2612 EXCEL.EXE 1588 WINWORD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2600 2220 cmd.exe 29 PID 2220 wrote to memory of 2600 2220 cmd.exe 29 PID 2220 wrote to memory of 2600 2220 cmd.exe 29 PID 2220 wrote to memory of 2572 2220 cmd.exe 30 PID 2220 wrote to memory of 2572 2220 cmd.exe 30 PID 2220 wrote to memory of 2572 2220 cmd.exe 30 PID 2220 wrote to memory of 2376 2220 cmd.exe 32 PID 2220 wrote to memory of 2376 2220 cmd.exe 32 PID 2220 wrote to memory of 2376 2220 cmd.exe 32 PID 2376 wrote to memory of 2424 2376 chrome.exe 33 PID 2376 wrote to memory of 2424 2376 chrome.exe 33 PID 2376 wrote to memory of 2424 2376 chrome.exe 33 PID 2220 wrote to memory of 2612 2220 cmd.exe 35 PID 2220 wrote to memory of 2612 2220 cmd.exe 35 PID 2220 wrote to memory of 2612 2220 cmd.exe 35 PID 2220 wrote to memory of 2612 2220 cmd.exe 35 PID 2220 wrote to memory of 2612 2220 cmd.exe 35 PID 2220 wrote to memory of 2612 2220 cmd.exe 35 PID 2220 wrote to memory of 2612 2220 cmd.exe 35 PID 2220 wrote to memory of 2612 2220 cmd.exe 35 PID 2220 wrote to memory of 2612 2220 cmd.exe 35 PID 2220 wrote to memory of 1588 2220 cmd.exe 37 PID 2220 wrote to memory of 1588 2220 cmd.exe 37 PID 2220 wrote to memory of 1588 2220 cmd.exe 37 PID 2220 wrote to memory of 1588 2220 cmd.exe 37 PID 2220 wrote to memory of 2716 2220 cmd.exe 38 PID 2220 wrote to memory of 2716 2220 cmd.exe 38 PID 2220 wrote to memory of 2716 2220 cmd.exe 38 PID 2220 wrote to memory of 2716 2220 cmd.exe 38 PID 2220 wrote to memory of 2716 2220 cmd.exe 38 PID 2220 wrote to memory of 2716 2220 cmd.exe 38 PID 2220 wrote to memory of 2716 2220 cmd.exe 38 PID 2220 wrote to memory of 2716 2220 cmd.exe 38 PID 2220 wrote to memory of 2716 2220 cmd.exe 38 PID 2220 wrote to memory of 2284 2220 cmd.exe 39 PID 2220 wrote to memory of 2284 2220 cmd.exe 39 PID 2220 wrote to memory of 2284 2220 cmd.exe 39 PID 2716 wrote to memory of 2188 2716 POWERPNT.EXE 41 PID 2716 wrote to memory of 2188 2716 POWERPNT.EXE 41 PID 2716 wrote to memory of 2188 2716 POWERPNT.EXE 41 PID 2716 wrote to memory of 2188 2716 POWERPNT.EXE 41 PID 2376 wrote to memory of 1408 2376 chrome.exe 42 PID 2376 wrote to memory of 1408 2376 chrome.exe 42 PID 2376 wrote to memory of 1408 2376 chrome.exe 42 PID 2376 wrote to memory of 1408 2376 chrome.exe 42 PID 2376 wrote to memory of 1408 2376 chrome.exe 42 PID 2376 wrote to memory of 1408 2376 chrome.exe 42 PID 2376 wrote to memory of 1408 2376 chrome.exe 42 PID 2376 wrote to memory of 1408 2376 chrome.exe 42 PID 2376 wrote to memory of 1408 2376 chrome.exe 42 PID 2376 wrote to memory of 1408 2376 chrome.exe 42 PID 2376 wrote to memory of 1408 2376 chrome.exe 42 PID 2376 wrote to memory of 1408 2376 chrome.exe 42 PID 2376 wrote to memory of 1408 2376 chrome.exe 42 PID 2376 wrote to memory of 1408 2376 chrome.exe 42 PID 2376 wrote to memory of 1408 2376 chrome.exe 42 PID 2376 wrote to memory of 1408 2376 chrome.exe 42 PID 2376 wrote to memory of 1408 2376 chrome.exe 42 PID 2376 wrote to memory of 1408 2376 chrome.exe 42 PID 2376 wrote to memory of 1408 2376 chrome.exe 42 PID 2376 wrote to memory of 1408 2376 chrome.exe 42 PID 2376 wrote to memory of 1408 2376 chrome.exe 42 PID 2376 wrote to memory of 1408 2376 chrome.exe 42 PID 2376 wrote to memory of 1408 2376 chrome.exe 42
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\batch.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\explorer.exeexplorer2⤵PID:2600
-
-
C:\Windows\system32\cmd.execmd2⤵PID:2572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef64c9758,0x7fef64c9768,0x7fef64c97783⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1120 --field-trial-handle=1692,i,18105216176540046388,13372096966684472532,131072 /prefetch:23⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1304 --field-trial-handle=1692,i,18105216176540046388,13372096966684472532,131072 /prefetch:83⤵PID:1260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1380 --field-trial-handle=1692,i,18105216176540046388,13372096966684472532,131072 /prefetch:83⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2276 --field-trial-handle=1692,i,18105216176540046388,13372096966684472532,131072 /prefetch:13⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2284 --field-trial-handle=1692,i,18105216176540046388,13372096966684472532,131072 /prefetch:13⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3212 --field-trial-handle=1692,i,18105216176540046388,13372096966684472532,131072 /prefetch:23⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2232 --field-trial-handle=1692,i,18105216176540046388,13372096966684472532,131072 /prefetch:13⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3892 --field-trial-handle=1692,i,18105216176540046388,13372096966684472532,131072 /prefetch:83⤵PID:2036
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"2⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2612
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"2⤵
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1588
-
-
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2188
-
-
-
C:\Windows\system32\cmd.execmd2⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
987B
MD58ea74143daf41239ec081ec43f040b9c
SHA140f3ea15dc7a98417e98a9a265a10b691227d582
SHA256f853ed681788e59c02ec911dde7f220ed69c2457a46db22a8122b191a9b6d0df
SHA5125c221cc094ffa12de4a72aa1a49fd2e9893911430fc13c0322d9ba79e8497e0696d8690026100f972a88f72c0d603807b2f64b98410761c5d1e1af8e1929d8b5
-
Filesize
988B
MD5895c17ed1f71b6d749e51eb6bc879f71
SHA184a367c3ff09f1eb9df18c3eee501085669ed39a
SHA256d4acd571713c0321e76765cd0e501fa6a98ba3bbd3cbb82b3f305953768471c9
SHA51205b0b58bd58005c83f8a2b2b3efd31d436482438905ca048a1c33396ac2bae1b9be94d2fac47b5b7088c4780bcf88c7d9e7500014a20b2c30de8d71b497c3293
-
Filesize
5KB
MD5fce2adf89833d90c569dcbd84f9cd2ba
SHA1ef0026c48a7e4d1aa432f10688857cd376ba4be4
SHA2561dea3414fa72c230d5882e702e3248c75a77cf83e2f684ab3295d7bb60dc7af1
SHA512d7bd21587349d65507cfd9b4c67efa4d4dbe57e0715f925d7e010112cb04be797607d6d81b89c46ab35d33ffd2a3199892678758cdcb1b4ab8020ce332eb5989
-
Filesize
5KB
MD596b2d17758cc50736a2dce7f019a3bf1
SHA1208da3ed396501697656db3019b493cc9f83bbe7
SHA2566e98df016a718af820545f5b574452d8ab2ae2e3c9be84050d8435bf7f6ef517
SHA51237b1d70345e03b8aa1a17b54258e18bbba31ae5cf0422ee7c7a38957f0d0877e4223dd2f0ff4341064efaaea9b19ab93b50090c864c51f5bbc69f315caeec9fd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
20KB
MD550a897ccbcd4ceee3c58d3b12ae66ef7
SHA1f909dbd8d31b01aecdc416df4034d2db39fc68bb
SHA256110849e21e2ed4b80ac722d90517a940fbda9269bebf32aa994f2455c81a5882
SHA512132549ca8298d1c3bb02307d17b8467943c1fa444bd5debdd3e0ece0cb33c4f3a83c8d5b362c42b9d9bf7623b6d8ab4072fa72f378e5af2e46ab35c795fe7bca