Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-04-2024 02:40
Static task
static1
Behavioral task
behavioral1
Sample
b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe
Resource
win10v2004-20240412-en
General
-
Target
b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe
-
Size
45KB
-
MD5
f4dc5ff155bea6cac06d9bd22afcd892
-
SHA1
65de87ea390aff2005c44c664dd6ad401af0b798
-
SHA256
b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70
-
SHA512
49a948dab7767a7df7f825bf16c965fcc9739d71fe70f04f97484511e9e59e9d83f7d1af3075ca8de7ff94ce8e80f478c7375e52e9c4c18f0aa473c1c7be88eb
-
SSDEEP
768:xmFQj8rM9whcqet8Wfxd9Mmnfa+TAOBJgZiPGyilSniJO14ktp7DFK+5nEn1:zAwEmBZ04faWmtN4nic+6G1
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe -
Detects executables built or packed with MPress PE compressor 36 IoCs
resource yara_rule behavioral1/memory/2812-0-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x0008000000015c23-8.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2812-106-0x0000000002560000-0x000000000258E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x0009000000015ec0-110.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2944-112-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2944-115-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x0006000000016332-116.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2316-123-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2316-126-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x00060000000165ae-127.dat INDICATOR_EXE_Packed_MPress behavioral1/files/0x000600000001663d-136.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/828-144-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1008-137-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/828-147-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x00060000000167db-148.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/1912-158-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x0006000000016b5e-159.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2812-165-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2300-171-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x0009000000015ec0-225.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2812-227-0x0000000002560000-0x000000000258E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x0006000000016332-237.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/3012-232-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1276-241-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x00060000000165ae-242.dat INDICATOR_EXE_Packed_MPress behavioral1/files/0x000600000001663d-259.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/1128-254-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x00060000000167db-263.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2028-262-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1512-273-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x0006000000016b5e-274.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/920-284-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/920-285-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x0006000000016b96-286.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/3024-297-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2812-449-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 13 IoCs
pid Process 2944 xk.exe 2316 IExplorer.exe 1008 WINLOGON.EXE 828 CSRSS.EXE 1912 SERVICES.EXE 2300 LSASS.EXE 3012 xk.exe 1276 IExplorer.exe 1128 WINLOGON.EXE 2028 CSRSS.EXE 1512 SERVICES.EXE 920 LSASS.EXE 3024 SMSS.EXE -
Loads dropped DLL 22 IoCs
pid Process 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File created F:\desktop.ini b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened for modification C:\desktop.ini b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File created C:\desktop.ini b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened for modification F:\desktop.ini b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened (read-only) \??\G: b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened (read-only) \??\S: b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened (read-only) \??\V: b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened (read-only) \??\B: b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened (read-only) \??\Q: b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened (read-only) \??\T: b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened (read-only) \??\U: b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened (read-only) \??\Y: b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened (read-only) \??\L: b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened (read-only) \??\J: b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened (read-only) \??\M: b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened (read-only) \??\Z: b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened (read-only) \??\I: b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened (read-only) \??\K: b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened (read-only) \??\N: b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened (read-only) \??\O: b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened (read-only) \??\P: b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened (read-only) \??\R: b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened (read-only) \??\W: b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened (read-only) \??\X: b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened (read-only) \??\H: b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File created C:\Windows\SysWOW64\IExplorer.exe b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File created C:\Windows\system32\perfc00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfc011.dat OUTLOOK.EXE File created C:\Windows\system32\perfh011.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00C.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\Mig2.scr b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File created C:\Windows\SysWOW64\PerfStringBackup.TMP OUTLOOK.EXE File created C:\Windows\system32\perfc009.dat OUTLOOK.EXE File created C:\Windows\system32\perfh009.dat OUTLOOK.EXE File created C:\Windows\system32\perfc010.dat OUTLOOK.EXE File created C:\Windows\system32\perfh010.dat OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\shell.exe b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File created C:\Windows\SysWOW64\shell.exe b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened for modification C:\Windows\SysWOW64\PerfStringBackup.INI OUTLOOK.EXE File created C:\Windows\system32\perfc007.dat OUTLOOK.EXE File created C:\Windows\system32\perfh007.dat OUTLOOK.EXE -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File created C:\Windows\xk.exe b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File created C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File opened for modification C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File created C:\Windows\inf\Outlook\0009\outlperf.ini OUTLOOK.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\ b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote OUTLOOK.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" OUTLOOK.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel OUTLOOK.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F8-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006304A-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D5-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630A0-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630A0-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630EF-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630EB-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DE-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006305A-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DE-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630FD-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CF-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DB-0000-0000-C000-000000000046}\ = "_AccountRuleCondition" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DA-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063021-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CD-0000-0000-C000-000000000046}\ = "_Rule" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D4-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006300D-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DF-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672EF-0000-0000-C000-000000000046}\ = "_OlkTimeControl" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D6-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630B1-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630B0-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630FC-0000-0000-C000-000000000046}\ = "_TimeZones" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063072-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D87E7E17-6897-11CE-A6C0-00AA00608FAA}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DD-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672EC-0000-0000-C000-000000000046}\ = "OlkContactPhotoEvents" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F5-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006304A-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CC-0000-0000-C000-000000000046}\ = "_Rules" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DA-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630A0-0000-0000-C000-000000000046}\ = "_ViewField" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00067366-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063104-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F1-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CA-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063083-0000-0000-C000-000000000046}\ = "_SyncObject" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630EF-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F3-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630FE-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E8-0000-0000-C000-000000000046}\ = "_NavigationModule" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{50BB9B50-811D-11CE-B565-00AA00608FAA}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DB-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006303E-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063087-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CA-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630C6-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630B1-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{50BB9B50-811D-11CE-B565-00AA00608FAA}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630A2-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063026-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063077-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CE-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DE-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063043-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006304C-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F4-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F6-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630FB-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063080-0000-0000-C000-000000000046}\ = "PropertyPages" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063099-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063104-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672E4-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 872 OUTLOOK.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 872 OUTLOOK.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 872 OUTLOOK.EXE 872 OUTLOOK.EXE 872 OUTLOOK.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 872 OUTLOOK.EXE 872 OUTLOOK.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 2944 xk.exe 2316 IExplorer.exe 1008 WINLOGON.EXE 828 CSRSS.EXE 1912 SERVICES.EXE 2300 LSASS.EXE 3012 xk.exe 1276 IExplorer.exe 1128 WINLOGON.EXE 2028 CSRSS.EXE 1512 SERVICES.EXE 920 LSASS.EXE 3024 SMSS.EXE 872 OUTLOOK.EXE -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2944 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 28 PID 2812 wrote to memory of 2944 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 28 PID 2812 wrote to memory of 2944 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 28 PID 2812 wrote to memory of 2944 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 28 PID 2812 wrote to memory of 2316 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 29 PID 2812 wrote to memory of 2316 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 29 PID 2812 wrote to memory of 2316 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 29 PID 2812 wrote to memory of 2316 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 29 PID 2812 wrote to memory of 1008 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 30 PID 2812 wrote to memory of 1008 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 30 PID 2812 wrote to memory of 1008 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 30 PID 2812 wrote to memory of 1008 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 30 PID 2812 wrote to memory of 828 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 31 PID 2812 wrote to memory of 828 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 31 PID 2812 wrote to memory of 828 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 31 PID 2812 wrote to memory of 828 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 31 PID 2812 wrote to memory of 1912 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 32 PID 2812 wrote to memory of 1912 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 32 PID 2812 wrote to memory of 1912 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 32 PID 2812 wrote to memory of 1912 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 32 PID 2812 wrote to memory of 2300 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 33 PID 2812 wrote to memory of 2300 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 33 PID 2812 wrote to memory of 2300 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 33 PID 2812 wrote to memory of 2300 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 33 PID 2812 wrote to memory of 3012 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 34 PID 2812 wrote to memory of 3012 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 34 PID 2812 wrote to memory of 3012 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 34 PID 2812 wrote to memory of 3012 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 34 PID 2812 wrote to memory of 1276 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 35 PID 2812 wrote to memory of 1276 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 35 PID 2812 wrote to memory of 1276 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 35 PID 2812 wrote to memory of 1276 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 35 PID 2812 wrote to memory of 1128 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 36 PID 2812 wrote to memory of 1128 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 36 PID 2812 wrote to memory of 1128 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 36 PID 2812 wrote to memory of 1128 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 36 PID 2812 wrote to memory of 2028 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 37 PID 2812 wrote to memory of 2028 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 37 PID 2812 wrote to memory of 2028 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 37 PID 2812 wrote to memory of 2028 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 37 PID 2812 wrote to memory of 1512 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 38 PID 2812 wrote to memory of 1512 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 38 PID 2812 wrote to memory of 1512 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 38 PID 2812 wrote to memory of 1512 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 38 PID 2812 wrote to memory of 920 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 39 PID 2812 wrote to memory of 920 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 39 PID 2812 wrote to memory of 920 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 39 PID 2812 wrote to memory of 920 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 39 PID 2812 wrote to memory of 3024 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 40 PID 2812 wrote to memory of 3024 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 40 PID 2812 wrote to memory of 3024 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 40 PID 2812 wrote to memory of 3024 2812 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 40 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe"C:\Users\Admin\AppData\Local\Temp\b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2812 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2944
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2316
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1008
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:828
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1912
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2300
-
-
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3012
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1276
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1128
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2028
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1512
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:920
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3024
-
-
C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:872
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD50bce2fabd4577ea702b5942622782675
SHA1ce731dc7ecad1145c278bf48f58e5fdb770d0fc0
SHA256bda00165481e91054d8bd7b820b496418973d96d008989500f081848bfac87a3
SHA512546bea650a3cce4c8f6d621fc904af3f6859b839d1e540bc328e5d8adfede77ddb55ce5d4f585223264fc9173d940298f473b236a300f3016dafb6a9113ad84f
-
Filesize
240KB
MD5b0b385c9326c25b5362f30a25f480d75
SHA14a9bf09c6806f0746d7ef896e7f2121cbdad90c8
SHA2563b66e6314cfd1a08e5976e928952d4bf25e4282ad3a0abb550f158970a356d05
SHA512704bc8cb6235ddb34740cd0386d4ee1ffd1e034438ac01ba0374e828dca5c1d4bf4807ae6cf622827a028a068ff12850af1f4cb2b38f8cf0bbfd47680585787b
-
Filesize
1KB
MD548dd6cae43ce26b992c35799fcd76898
SHA18e600544df0250da7d634599ce6ee50da11c0355
SHA2567bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a
SHA512c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31
-
Filesize
45KB
MD5191b38cfd8bd5d58aa6fc97cf0577193
SHA1c7144026fc1b1866966f8b27edf61fd3210979b5
SHA2561070d8bd82296bac7470a847796eed89ab2156094cbc69b77d23e824521677c8
SHA51295ebe70b77c99ab984a43d18083e1cd76929579ef4dee380f9883d791f4234b541ed5e86a7868203a2b60cb3efaeacb48a1250441d3a6164b67e0be90472136d
-
Filesize
45KB
MD5f4dc5ff155bea6cac06d9bd22afcd892
SHA165de87ea390aff2005c44c664dd6ad401af0b798
SHA256b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70
SHA51249a948dab7767a7df7f825bf16c965fcc9739d71fe70f04f97484511e9e59e9d83f7d1af3075ca8de7ff94ce8e80f478c7375e52e9c4c18f0aa473c1c7be88eb
-
Filesize
45KB
MD5fb8fb2743a31738f46e4df5fa7140895
SHA133cdf0d24558742657b7405143bc41f0888c63df
SHA256205e97664975163e3da1380c040adc9563911358dd82825aeb5ad94cbae01bc8
SHA512ef7114ca058c5bcc54d6075411277dd96d08c78b66fc50f233bf430ec809cd46615218bda5003a5a59faff039ae63b90bfd000a60daaefaf7b5a20f6d1d4e30d
-
Filesize
45KB
MD5248c40b4d47c43cdab6de2958787c779
SHA19573db39a804a45c1ba1b014d570ec8185c08c53
SHA256d625b602f5576e12c2cae712ce0bbf719ea5135293334268a5ebdb2be4873abf
SHA51231082cc189df6661f5c33a0e4087a5b06c290695a02618661dfe59c66a675e5dbf1cee8ccb81690d85d4c278323e18635df0b818a94ab9eae8fb6b68c1d2b6a6
-
Filesize
45KB
MD5e2ab3dee75e5192bfbd760101431ad7d
SHA154cd87643e14b287813b6f23cd8f9c8f0afed131
SHA2565e1ddf7116000f65cb61ea7970b9bbaf59ca2b5e2a70d87884f47a51ee247af0
SHA512b830a1b0e65e81fcbf1f612199f3c49c333f5af9d08c76d951016a4502918a54ce3102aa277af0727b5cae6abe21ebf871b2c7ad850fac6e686dfb1cec87ddcf
-
Filesize
45KB
MD55628f967d9e7943eef8d3d2f0aca779f
SHA11d5db72d3a1207d9aad20e6e3cc7543bc3137a15
SHA2569c2468c0edb7666fd41a48d9294d172fd84863d88af2d894fc281282d7ade040
SHA512064d9a7a533ea6a2f9f962aa4215484c0cda94f15c09ef2cd2a3faf7469a2390a7af55fdc0300ab2bf6be6198a879eeee1b5de9de9e8749ab0ccdb57e1df5c97
-
Filesize
45KB
MD559733e39674e7962bd44f79a443114ed
SHA1099ba164d9cc7709d72dc7bcf23fb82c57703523
SHA2561b451f3c657214b7954de6f539b14ecdc17bf71b39cb3c4927f5dba940dd9c5d
SHA5129bc6eec87afa38be78ddb9a6d91e67d176f41da16e86fbe65f473337f29069b9a2e19b8f489e50821b93f87997181239ddbdc60d95111b625421915ef64fd6e9
-
Filesize
45KB
MD52f5d0af5f0e9b87f323a50f4c90ecf84
SHA1e805bb576d8dc9f5a225550d188026a26aa65c8b
SHA25692e9086af4bbe94cc0b805eb0096f5ff1447e3b081c25f56ad2908da3ec051d3
SHA512d96c884d281979e8e6ae7701175c24d5e4d4b1009a94dd8542a889b36d24f26843bb93bda886775080ae394ba3995578f2b5faff25c30dc80af2c00684f9ba55
-
Filesize
45KB
MD531fc67c51652171bc945e4e6435b4872
SHA1113e4e1a3a8538c8cac93a1681a82897a57dbf14
SHA2566c0ea58aaadf9194bb314d403604bd56c0dd6162680a83ff8cfbf51ae0a82b94
SHA5129203a83e7ee8049e2df9333bc0e82a332ab64d1b535b0c86647f9bc87f4347100ff84db2428aaefebe5eaab0138b38d22b079fdbac24e0b55da88f48559a8a03
-
Filesize
45KB
MD56cb6985f4a8a3bdb230b6b66f71e0533
SHA170291c7e63d88ac7c321e96d38a5196ecf2dec87
SHA256f5b15d5dc571516bd073c363870c6e5340d383cb3893df75f42e0ca8ae0893d2
SHA512a0dab6a295970dda848133471707e76d9f67a31c7bed4afdcf41403c76ca8e45566749c05b311048659ebf1718cac33092868d0a786a53ea08277d615295c916
-
Filesize
45KB
MD533ffa843651e63c4d09b6a3fc2924423
SHA13c4ae912c36f4a29ade86905794e564fa1bfff46
SHA2566acf1c67e5e824140e29cbdd546a90cf8fd2498ac826f5e61b9e631838ce86fb
SHA51265ece6d7bef5b1e3d61949bbe5597000cb7000f690f90b536d602ba67af794212cfd99e2f9be5363b0c92438ea5b7bed634100e1e24b967f7f4ab32325c7a102
-
Filesize
45KB
MD55cd8865b91b3c0126e5549454c03b609
SHA19dd49549b511a4b2d191033c6d4d339044ba4d42
SHA256bb7e2fa426af941e82df0254e9e4f228f7e6c9f03974e86d4755a7be56b6b3a8
SHA512b53910cd49fbf99bad5a09e7f8b14a91088910e795590d4aeaede9fa5db231781cfc0721872fae54e64aaade224d728eb21bf8c02a04bd77b0284c0517231041
-
Filesize
45KB
MD556abcbfe700eba22f1588e0b558d8702
SHA1a892cf8201c230211c49e4eb7880c6a3302ac965
SHA256987a58c36a4691efc47844cc50601d7734189bca453dfd7d479fb2f61b7e3c9e
SHA512afeac532cf66dfce3ee5d6d788dd59c7d2dd8959354808cfc374998b9cd2d913db0c6bfb0475dc43310d0a59b305917eb31769ebb7bfdc7443ccfe60faee8969
-
Filesize
45KB
MD5d5b61c29b02f0099fd58025831819de6
SHA1fa699b2f4a9bacca15b33a13e261f811f14d16e3
SHA256238e740134997e5228bf9b79a2c02e2e783aa084289356c818f05aa061dab76a
SHA5129a9e75ac26c10d3d55094be790fe94457d3f1a90e0f866d84f9eda39d4df0e1336c4a791e01ce5087fddf121532329fb9844d7392ae01387bcd2bb9e15da8937