Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2024, 16:36
Static task
static1
Behavioral task
behavioral1
Sample
d3fe160eeeaafeabb355124043bccda5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d3fe160eeeaafeabb355124043bccda5.exe
Resource
win10v2004-20240226-en
General
-
Target
d3fe160eeeaafeabb355124043bccda5.exe
-
Size
8.7MB
-
MD5
d3fe160eeeaafeabb355124043bccda5
-
SHA1
b37a9fc6f4b77b0d5f7932ef4ec8e13c5f771e3f
-
SHA256
61144a1aad3394a9380366fa97f481e66dc083a1ad0715995420b29c81e85a5d
-
SHA512
79f2aaca952d09ebd64886fe189076dddd4e6f6f47c8c7e2e16a10f1191e37fa5461fef922d7d4ab5fdca73d0f273c645a749771d86335b6f1345d9009b70abe
-
SSDEEP
49152:T+++++Xrlj4hKPgssSt2gOfgitQMZgdeKVQkUbcokNnMzq:C+hv7St4giod9oq
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" d3fe160eeeaafeabb355124043bccda5.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf d3fe160eeeaafeabb355124043bccda5.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\IME\SHARED\imecfmui.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\backgroundTaskHost.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\wermgr.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\CloudNotifications.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\gpscript.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\proquota.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\RMActivate_ssp_isv.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\WSManHTTPConfig.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\xcopy.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\takeown.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\WPDShextAutoplay.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\agentactivationruntimestarter.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\dxdiag.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\isoburn.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\Robocopy.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\fontview.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\tttracer.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\ARP.EXE d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\mfpmp.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\rekeywiz.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\SystemPropertiesHardware.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\Windows.WARP.JITService.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\schtasks.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\sdiagnhost.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\IME\IMEJP\IMJPSET.EXE d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\cmdl32.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\diskperf.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\dplaysvr.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\dtdump.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\OpenWith.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\SystemPropertiesPerformance.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\print.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\regedt32.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\Dism\DismHost.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\InstallShield\setup.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\gpresult.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\LaunchTM.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\mtstocom.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\PkgMgr.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\SystemPropertiesComputerName.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\wlanext.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\wscadminui.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\perfhost.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\TapiUnattend.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\TSTheme.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\whoami.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\upnpcont.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\EaseOfAccessDialog.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\GameBarPresenceWriter.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\ieUnatt.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\NETSTAT.EXE d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\rrinstaller.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\tar.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\cmd.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\CredentialUIBroker.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\netbtugc.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\SystemPropertiesProtection.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\UserAccountControlSettings.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\wecutil.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\DevicePairingWizard.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\dvdplay.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\lodctr.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\SettingSyncHost.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SysWOW64\chkdsk.exe d3fe160eeeaafeabb355124043bccda5.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\misc.exe d3fe160eeeaafeabb355124043bccda5.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.185.17\MicrosoftEdgeUpdateOnDemand.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe$ d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.185.17\MicrosoftEdgeUpdateBroker.exe$ d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe$ d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe$ d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSQRY32.EXE d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ORGCHART.EXE d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0C0A-1000-0000000FF1CE}\misc.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe$ d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE$ d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\IntegratedOffice.exe$ d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\OfficeClickToRun.exe d3fe160eeeaafeabb355124043bccda5.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe d3fe160eeeaafeabb355124043bccda5.exe File created C:\Program Files\Java\jdk-1.8\bin\javaw.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE$ d3fe160eeeaafeabb355124043bccda5.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DWTRIG20.EXE d3fe160eeeaafeabb355124043bccda5.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe$ d3fe160eeeaafeabb355124043bccda5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOHTMED.EXE$ d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe$ d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe d3fe160eeeaafeabb355124043bccda5.exe File created C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate64.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe$ d3fe160eeeaafeabb355124043bccda5.exe File created C:\Program Files\Java\jre-1.8\bin\keytool.exe d3fe160eeeaafeabb355124043bccda5.exe File created C:\Program Files\Microsoft Office\root\Office16\ORGCHART.EXE d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\visicon.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoev.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\osmclienticon.exe d3fe160eeeaafeabb355124043bccda5.exe File created C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\StoreExperienceHost.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe d3fe160eeeaafeabb355124043bccda5.exe File created C:\Program Files\Java\jdk-1.8\bin\jdb.exe d3fe160eeeaafeabb355124043bccda5.exe File created C:\Program Files\Java\jdk-1.8\bin\jhat.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe$ d3fe160eeeaafeabb355124043bccda5.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOICONS.EXE d3fe160eeeaafeabb355124043bccda5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe d3fe160eeeaafeabb355124043bccda5.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe$ d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe d3fe160eeeaafeabb355124043bccda5.exe File created C:\Program Files\Java\jdk-1.8\bin\jcmd.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE$ d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\lyncicon.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE$ d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\pipanel.exe d3fe160eeeaafeabb355124043bccda5.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\assembly\GAC_32\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\assembly\GAC_MSIL\PresentationFontCache\3.0.0.0__31bf3856ad364e35\PresentationFontCache.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\reader_sl.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\PeopleExperienceHost.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\RegSvcs.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v3.5\EdmGen.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SystemApps\Microsoft.AsyncTextService_8wekyb3d8bbwe\Microsoft.AsyncTextService.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\dfsvc.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\RegAsm.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_64\MSBuild\v4.0_4.0.0.0__b03f5f7f11d50a3a\MSBuild.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Workflow.Compiler\v4.0_4.0.0.0__31bf3856ad364e35\Microsoft.Workflow.Compiler.exe$ d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_regsql.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\aspnet_regiis.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v3.5\MSBuild.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\assembly\GAC_MSIL\PresentationFontCache\3.0.0.0__31bf3856ad364e35\PresentationFontCache.exe$ d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_regiis.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMSvcHost.exe$ d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe d3fe160eeeaafeabb355124043bccda5.exe File created C:\Windows\assembly\GAC_MSIL\ComSvcConfig\3.0.0.0__b03f5f7f11d50a3a\ComSvcConfig.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\jsc.exe d3fe160eeeaafeabb355124043bccda5.exe File created C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\ServiceModelReg.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\DataSvcUtil.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\servicing\TrustedInstaller.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\aspnet_regsql.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v3.0\WPF\XamlViewer\XamlViewer_v0300.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v3.5\AddInProcess.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\assembly\GAC_32\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\assembly\GAC_MSIL\ComSvcConfig\3.0.0.0__b03f5f7f11d50a3a\ComSvcConfig.exe$ d3fe160eeeaafeabb355124043bccda5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\MSBuild\v4.0_4.0.0.0__b03f5f7f11d50a3a\MSBuild.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\ComSvcConfig.exe d3fe160eeeaafeabb355124043bccda5.exe File created C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\ComSvcConfig.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.AssignedAccessLockApp_cw5n1h2txyewy\AssignedAccessLockApp.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SystemApps\microsoft.creddialoghost_cw5n1h2txyewy\CredDialogHost.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\ComSvcConfig\v4.0_4.0.0.0__b03f5f7f11d50a3a\ComSvcConfig.exe$ d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\SMSvcHost.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.5\WFServicesReg.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\aspnet_state.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.CallingShellApp_cw5n1h2txyewy\CallingShellApp.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dfsvc.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\WsatConfig\v4.0_4.0.0.0__b03f5f7f11d50a3a\WsatConfig.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_wp.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\WsatConfig.exe$ d3fe160eeeaafeabb355124043bccda5.exe File created C:\Windows\Microsoft.NET\Framework\v3.0\WPF\XamlViewer\XamlViewer_v0300.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.5\AddInProcess.exe d3fe160eeeaafeabb355124043bccda5.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMConfigInstaller.exe$ d3fe160eeeaafeabb355124043bccda5.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf d3fe160eeeaafeabb355124043bccda5.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1660 d3fe160eeeaafeabb355124043bccda5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3fe160eeeaafeabb355124043bccda5.exe"C:\Users\Admin\AppData\Local\Temp\d3fe160eeeaafeabb355124043bccda5.exe"1⤵
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:1660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.7MB
MD5d3fe160eeeaafeabb355124043bccda5
SHA1b37a9fc6f4b77b0d5f7932ef4ec8e13c5f771e3f
SHA25661144a1aad3394a9380366fa97f481e66dc083a1ad0715995420b29c81e85a5d
SHA51279f2aaca952d09ebd64886fe189076dddd4e6f6f47c8c7e2e16a10f1191e37fa5461fef922d7d4ab5fdca73d0f273c645a749771d86335b6f1345d9009b70abe