Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 01:12
Behavioral task
behavioral1
Sample
d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe
Resource
win10v2004-20240226-en
General
-
Target
d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe
-
Size
196KB
-
MD5
80d765bf7ac04c4607cacf0754b73178
-
SHA1
a2a91440be0fd6d4f316553926bcda919032b776
-
SHA256
d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea
-
SHA512
e0a09385f64e0ac27c3d894f7bf4d3ed5f115265c1b23fd7ac2166ec4023402abcca1b3dd499a68ee59b31331ede66fec50331eb88ac7427a820bd0bb7b297b9
-
SSDEEP
3072:ZOgUXoutNzxZVX4/awxfodLJUBv9Bsor1rHjhMU9npQQpmuG:ZFYoSJRARoYlld9n2Qpmx
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe -
UPX dump on OEP (original entry point) 30 IoCs
resource yara_rule behavioral1/memory/2884-0-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/files/0x0007000000015364-8.dat UPX behavioral1/files/0x0006000000016cf0-109.dat UPX behavioral1/memory/596-111-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/596-113-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/files/0x0006000000016d24-114.dat UPX behavioral1/memory/976-123-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/files/0x0006000000016d41-124.dat UPX behavioral1/memory/240-133-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/files/0x0006000000016d4a-144.dat UPX behavioral1/memory/240-136-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/2884-146-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/2248-149-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/files/0x0006000000016cf0-203.dat UPX behavioral1/files/0x0006000000016d24-213.dat UPX behavioral1/memory/2884-216-0x00000000003D0000-0x00000000003FF000-memory.dmp UPX behavioral1/memory/1632-218-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/704-207-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/1632-220-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/files/0x0006000000016d41-219.dat UPX behavioral1/memory/1740-227-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/1740-232-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/2884-237-0x00000000003D0000-0x00000000003FF000-memory.dmp UPX behavioral1/files/0x0006000000016d4f-243.dat UPX behavioral1/memory/440-252-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/files/0x0006000000016d55-255.dat UPX behavioral1/files/0x0006000000016d84-263.dat UPX behavioral1/memory/1252-262-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/1840-272-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/2884-424-0x0000000000400000-0x000000000042F000-memory.dmp UPX -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 11 IoCs
pid Process 596 xk.exe 976 IExplorer.exe 240 WINLOGON.EXE 2248 CSRSS.EXE 704 xk.exe 1632 IExplorer.exe 1740 WINLOGON.EXE 2952 CSRSS.EXE 440 SERVICES.EXE 1252 LSASS.EXE 1840 SMSS.EXE -
Loads dropped DLL 18 IoCs
pid Process 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe -
resource yara_rule behavioral1/memory/2884-0-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0007000000015364-8.dat upx behavioral1/files/0x0006000000016cf0-109.dat upx behavioral1/memory/596-111-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/596-113-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0006000000016d24-114.dat upx behavioral1/memory/976-123-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0006000000016d41-124.dat upx behavioral1/memory/240-133-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0006000000016d4a-144.dat upx behavioral1/memory/240-136-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2884-146-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2248-149-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0006000000016cf0-203.dat upx behavioral1/files/0x0006000000016d24-213.dat upx behavioral1/memory/2884-216-0x00000000003D0000-0x00000000003FF000-memory.dmp upx behavioral1/memory/1632-218-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/704-207-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1632-220-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0006000000016d41-219.dat upx behavioral1/memory/1740-227-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1740-232-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2884-237-0x00000000003D0000-0x00000000003FF000-memory.dmp upx behavioral1/files/0x0006000000016d4f-243.dat upx behavioral1/memory/440-252-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0006000000016d55-255.dat upx behavioral1/files/0x0006000000016d84-263.dat upx behavioral1/memory/1252-262-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1840-272-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2884-424-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\desktop.ini d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File created C:\desktop.ini d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened for modification F:\desktop.ini d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File created F:\desktop.ini d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened (read-only) \??\P: d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened (read-only) \??\S: d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened (read-only) \??\T: d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened (read-only) \??\U: d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened (read-only) \??\B: d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened (read-only) \??\I: d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened (read-only) \??\L: d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened (read-only) \??\W: d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened (read-only) \??\Q: d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened (read-only) \??\Y: d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened (read-only) \??\E: d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened (read-only) \??\J: d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened (read-only) \??\O: d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened (read-only) \??\Z: d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened (read-only) \??\G: d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened (read-only) \??\H: d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened (read-only) \??\V: d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened (read-only) \??\X: d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened (read-only) \??\K: d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened (read-only) \??\N: d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened (read-only) \??\R: d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File created C:\Windows\SysWOW64\IExplorer.exe d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened for modification C:\Windows\SysWOW64\PerfStringBackup.INI OUTLOOK.EXE File created C:\Windows\system32\perfh009.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfh010.dat OUTLOOK.EXE File created C:\Windows\system32\perfc011.dat OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\IExplorer.exe d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File created C:\Windows\system32\perfc009.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfc010.dat OUTLOOK.EXE File created C:\Windows\system32\perfh011.dat OUTLOOK.EXE File created C:\Windows\system32\perfh007.dat OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\shell.exe d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File created C:\Windows\SysWOW64\shell.exe d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File created C:\Windows\SysWOW64\Mig2.scr d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File created C:\Windows\SysWOW64\PerfStringBackup.TMP OUTLOOK.EXE File created C:\Windows\system32\perfc007.dat OUTLOOK.EXE -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File created C:\Windows\xk.exe d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe File created C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File opened for modification C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File created C:\Windows\inf\Outlook\0009\outlperf.ini OUTLOOK.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\ d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" OUTLOOK.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" OUTLOOK.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" OUTLOOK.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672E4-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D5-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630A7-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063085-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630C4-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063080-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063022-0000-0000-C000-000000000046}\ = "_JournalItem" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F2-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006303E-0000-0000-C000-000000000046}\ = "Actions" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063040-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CE-0000-0000-C000-000000000046}\ = "_RuleActions" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D8-0000-0000-C000-000000000046}\ = "_RuleConditions" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063047-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006303F-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063094-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063035-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063107-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006303C-0000-0000-C000-000000000046}\ = "Attachments" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006302D-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006302F-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630B1-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630EE-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672E2-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E8-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D3-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630C4-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006300A-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063097-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E9-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672EB-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063043-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006303D-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E1-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006302A-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006300D-0000-0000-C000-000000000046}\ = "ResultsEvents" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063086-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063020-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063059-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F0-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F5-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DF-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630FB-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063047-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672E3-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006303E-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CD-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063048-0000-0000-C000-000000000046}\ = "AddressLists" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630C4-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F3-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630A2-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006F026-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672D9-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F7-0000-0000-C000-000000000046}\ = "OlkInfoBarEvents" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E7-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E3-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630EA-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063038-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672E3-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063101-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006307A-0000-0000-C000-000000000046}\ = "OutlookBarPaneEvents" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006300A-0000-0000-C000-000000000046}\ = "_Explorers" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006302C-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DA-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006302D-0000-0000-C000-000000000046} OUTLOOK.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2400 OUTLOOK.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2400 OUTLOOK.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2400 OUTLOOK.EXE 2400 OUTLOOK.EXE 2400 OUTLOOK.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2400 OUTLOOK.EXE 2400 OUTLOOK.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 596 xk.exe 976 IExplorer.exe 240 WINLOGON.EXE 2248 CSRSS.EXE 704 xk.exe 1632 IExplorer.exe 1740 WINLOGON.EXE 2952 CSRSS.EXE 440 SERVICES.EXE 1252 LSASS.EXE 1840 SMSS.EXE 2400 OUTLOOK.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2884 wrote to memory of 596 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 28 PID 2884 wrote to memory of 596 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 28 PID 2884 wrote to memory of 596 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 28 PID 2884 wrote to memory of 596 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 28 PID 2884 wrote to memory of 976 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 29 PID 2884 wrote to memory of 976 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 29 PID 2884 wrote to memory of 976 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 29 PID 2884 wrote to memory of 976 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 29 PID 2884 wrote to memory of 240 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 30 PID 2884 wrote to memory of 240 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 30 PID 2884 wrote to memory of 240 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 30 PID 2884 wrote to memory of 240 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 30 PID 2884 wrote to memory of 2248 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 31 PID 2884 wrote to memory of 2248 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 31 PID 2884 wrote to memory of 2248 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 31 PID 2884 wrote to memory of 2248 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 31 PID 2884 wrote to memory of 704 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 32 PID 2884 wrote to memory of 704 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 32 PID 2884 wrote to memory of 704 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 32 PID 2884 wrote to memory of 704 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 32 PID 2884 wrote to memory of 1632 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 33 PID 2884 wrote to memory of 1632 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 33 PID 2884 wrote to memory of 1632 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 33 PID 2884 wrote to memory of 1632 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 33 PID 2884 wrote to memory of 1740 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 34 PID 2884 wrote to memory of 1740 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 34 PID 2884 wrote to memory of 1740 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 34 PID 2884 wrote to memory of 1740 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 34 PID 2884 wrote to memory of 2952 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 35 PID 2884 wrote to memory of 2952 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 35 PID 2884 wrote to memory of 2952 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 35 PID 2884 wrote to memory of 2952 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 35 PID 2884 wrote to memory of 440 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 36 PID 2884 wrote to memory of 440 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 36 PID 2884 wrote to memory of 440 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 36 PID 2884 wrote to memory of 440 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 36 PID 2884 wrote to memory of 1252 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 37 PID 2884 wrote to memory of 1252 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 37 PID 2884 wrote to memory of 1252 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 37 PID 2884 wrote to memory of 1252 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 37 PID 2884 wrote to memory of 1840 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 38 PID 2884 wrote to memory of 1840 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 38 PID 2884 wrote to memory of 1840 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 38 PID 2884 wrote to memory of 1840 2884 d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe 38 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe"C:\Users\Admin\AppData\Local\Temp\d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2884 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:596
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:976
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:240
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2248
-
-
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:704
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1632
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1740
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2952
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:440
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1252
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1840
-
-
C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2400
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD52aff5fc0805ebf82640f4a2cf0e03c86
SHA19a50161c6ee26c09d991f846373b717e350dd860
SHA25650165ad7e0528655e4f7a038fa642a8b1d0c596f34a209ce3d40556bfe24b6ee
SHA512850d80e2e5996e32fc90f56758779f10ef6532ff8216599c6bd8d3d6d209556a9c1debb445662631291fe5ffa833bd3fdef901899a352389f0499aa7e69499ef
-
Filesize
1KB
MD548dd6cae43ce26b992c35799fcd76898
SHA18e600544df0250da7d634599ce6ee50da11c0355
SHA2567bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a
SHA512c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31
-
Filesize
196KB
MD5de70ec0f8614e42edc1e0e040c648561
SHA168ae869fd7a060b3c01a88448128b578db26e77b
SHA256b2395e9b9aaa986afaec5cc0f5cd9af856fe85c0931f3fe212183a1789ba56d0
SHA512a91529f875efe2c79873c728146d85329d73b50d537830123d9a490d17b356b566e3d91acdf7ac39628d1406209781ce880b524b7301f94841b48f78f17cf008
-
Filesize
196KB
MD580d765bf7ac04c4607cacf0754b73178
SHA1a2a91440be0fd6d4f316553926bcda919032b776
SHA256d0b0e88ab222105f1e5235625f39e99d1a49f135cc2a69e2dbfba6ac049f4dea
SHA512e0a09385f64e0ac27c3d894f7bf4d3ed5f115265c1b23fd7ac2166ec4023402abcca1b3dd499a68ee59b31331ede66fec50331eb88ac7427a820bd0bb7b297b9
-
Filesize
196KB
MD52d7bd2e61a849b5b2039d6f01712e7a4
SHA140ace6ed9c1e72601ec14a14524e85ec20c86db0
SHA256bbf12c0229a2720941c50e0459d166ff261e5cfbe8d523ee3381d3ad41e01dea
SHA5129f31978870352f05c3c86f237e50e9e9a32c2340c91716cf3a33fe970b827c771c1717ca43e48697cb675f43331ceede896537e6fc3e1beb610c5492ac7dedff
-
Filesize
196KB
MD582205505e13fa436ef107c71feaded5c
SHA17e93c1cd199dc9e7b2874f7a65db3d84451b7110
SHA25695c1de7b490ed668c10c2d0048236fc62e440fe3ed2b044b930f7fdb44127b8d
SHA5124684101fad49417138f2871b947b4bbddc3c65b09cb95864a08cb8fa48ad342d848a93e9faec87c3ba439304cf0f911839a5fcfe1dab2a47a1eccc29dc6cb98f
-
Filesize
196KB
MD52b8eedc5c49e5b141cb7977923ea01b5
SHA13791fb9adabe25ebb6fd60e1e35731dae7ecf8c3
SHA2561ee52f686deb46b101ef02fde4719138539e8ab596c7ad6e671d67aeba1e6ef3
SHA5125b2e014997ae11b5ee9ea24de54b55fdb6d8891d0a2f725fc1cdbac989d70b021eff732407a8f25b950ed2bb9dc4ed0a8ed44feddd4205aabe1d623b944be402
-
Filesize
196KB
MD5457d826238ba4df7afd49537d064532b
SHA1ca9a6879ed44fd34512ed8fed39fd8746782dcfa
SHA2569f85ffc7a8920810b2260c26ba70b1bca39ce71c0aadd082dd9c637a10b0ca2b
SHA5121a249e1b57b7eeedc985c62e2fd901bcdb0868378f3fe0909000804a94f06a248e469a724a910f27823eaf15cb0af74cb42bc1340328056ac9b460c7943ea200
-
Filesize
196KB
MD5a76415de17396e225e730e778d496b31
SHA12d98f8d8969b5b1580d4d4e761fcd35e1c103ccd
SHA256c0af64d9c1fff068927aed504a41bbf8a70ae8f0ea72af36df2601eead8177f3
SHA51243c98c58c9f105a92151a3b5c748d901490216c6b22c0fe1b90103c9db5362a764df8f57cea707cb5a98e13f29dd96ab5bb768f07067120b2da7fe3ee3ce5bdf
-
Filesize
196KB
MD50322c82abb4272415bace360bfdc0b18
SHA1c39ac10827c3e5289b4007f2a69c87c0c311b1ce
SHA2568f209344e87b24ed887bc163b3300ca9a19b4a65416a0fd0212272db1865201a
SHA512e9f9de6423cf205643054c190225f302d38f3f8ccb2a5d211af260ebe94b06cc474bfc760d83ea59ba0edbbb019e67b892162f7403cf75594a384c885958734a
-
Filesize
196KB
MD58ef89cb771772c767f97874b097f520e
SHA15dfeccec6a1d6e7c9a235b014332eef206905997
SHA2565739debf82ebfe46cac449cd0ddf5c2fa26d7f47ac85e57af1a03257beeb47ac
SHA5122324dd1bcec6436faacd9d0b3abdb2f96e64cb2554284b43aa537b2df3a2ca5048895bcf84575948ff0d0d860e596e6cc555f5f470af7995088c7ba875892052
-
Filesize
196KB
MD50d780601caaa036d886a487f6c4bbb54
SHA14247e752936cf520c38d81cd6273f6f147b07eb9
SHA256da048cfe57f62b8daca0b6c3b5c06642f9658db136477529f52b507ee2c09308
SHA512e25dd0d8b5e0ceb7653a8031f627c0c22bc7890ae910d94ebb84158fe6865b5d4cd46dc9091953b4c3d06f7111e0340cf1126ba76b41bb6e5c662547c52a9a45
-
Filesize
196KB
MD52d296f5ccf2ace5c75facb95e6c30c42
SHA1056fc5ba7a639a63419e343eef2f35d9c10f3bd5
SHA2563e4a030312e965c01f91944dbfe929d0452cdba168887b1608e9e19ae0a83141
SHA512a60548f67232038d56f0dd344ef0a167077b026f0668020e1952eec1c091b73f76f5ec315c0c12dcb28b757058c9fac1b1fef741c85844d5df39e747c80a9cd0