Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3SSDRM_for_...1).exe
windows7-x64
7SSDRM_for_...1).exe
windows10-2004-x64
3$PLUGINSDI...md.dll
windows7-x64
3$PLUGINSDI...md.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3PCWProtect...ce.exe
windows7-x64
7PCWProtect...ce.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...in.dll
windows7-x64
3$PLUGINSDI...in.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3GDISpy.sys
windows7-x64
1GDISpy.sys
windows10-2004-x64
1GDISpyB.sys
windows7-x64
1GDISpyB.sys
windows10-2004-x64
1PCW.dll
windows7-x64
1PCW.dll
windows10-2004-x64
1PCW64.dll
windows7-x64
7PCW64.dll
windows10-2004-x64
7PCWProtectorB.exe
windows7-x64
1PCWProtectorB.exe
windows10-2004-x64
1PCWProtectorDummy.exe
windows7-x64
1PCWProtectorDummy.exe
windows10-2004-x64
1PCWProtect...64.exe
windows7-x64
1PCWProtect...64.exe
windows10-2004-x64
1PCWProtect...4B.exe
windows7-x64
5PCWProtect...4B.exe
windows10-2004-x64
5Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2024, 14:03
Static task
static1
Behavioral task
behavioral1
Sample
SSDRM_for_mySingle (1).exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SSDRM_for_mySingle (1).exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
PCWProtectorSetup_Voice_Service.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
PCWProtectorSetup_Voice_Service.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/PCWPlugin.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/PCWPlugin.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
GDISpy.sys
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
GDISpy.sys
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
GDISpyB.sys
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
GDISpyB.sys
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
PCW.dll
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
PCW.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
PCW64.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
PCW64.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
PCWProtectorB.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
PCWProtectorB.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
PCWProtectorDummy.exe
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
PCWProtectorDummy.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
PCWProtectorDummy64.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
PCWProtectorDummy64.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
PCWProtectorService64B.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
PCWProtectorService64B.exe
Resource
win10v2004-20240226-en
General
-
Target
PCWProtectorSetup_Voice_Service.exe
-
Size
4.4MB
-
MD5
f14cc766cc424af695d5a22cf4603b00
-
SHA1
c305a43566ccc3427207c47f15ea348fb042ca60
-
SHA256
1e679e36e89a01b3c78d9e29600350d92469bded84088b4d00df2b70d50386f7
-
SHA512
bd7a7dbbb0e21c8893e968a5caa0390951e00281a7670f5d226cb8417b515e581d4726e61e36a39a83cdff4942204c96c57bdd7e5c11d50c178831ac63113739
-
SSDEEP
98304:gXr7+/ec6Mz2O1dXd8QDCoqF4AbrvQdw+bUiCMNjkTntdIhR3:gb769z2+dXdJ93q+bUi9ekT
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2524 PCWUpdater64.exe 1132 PCWProtectorService64.exe 4516 PCWProtectorDummy64.exe 4104 PCWProtector.exe -
Loads dropped DLL 26 IoCs
pid Process 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 4500 regsvr32.exe 1132 PCWProtectorService64.exe 4092 regsvr32.exe 4496 regsvr32.exe 1132 PCWProtectorService64.exe 1132 PCWProtectorService64.exe 4144 PCWProtectorSetup_Voice_Service.exe 1132 PCWProtectorService64.exe 4144 PCWProtectorSetup_Voice_Service.exe 1132 PCWProtectorService64.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 4104 PCWProtector.exe 4104 PCWProtector.exe 4104 PCWProtector.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe -
Registers COM server for autorun 1 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\InprocServer32\ = "C:\\Windows\\Protect\\PCW64.ocx" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{48AAF3B1-ABED-480E-B196-CA325A4E5D03}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{48AAF3B1-ABED-480E-B196-CA325A4E5D03}\InprocServer32\ = "C:\\Windows\\Protect\\PCW64.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\InprocServer32 regsvr32.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\TftLib.dll PCWProtectorService64.exe File created C:\Windows\SysWOW64\T_Prevent.dll PCWProtectorService64.exe File created C:\Windows\SysWOW64\TDCommonLib.dll PCWProtectorService64.exe File created C:\Windows\SysWOW64\T_Prevent64.dll PCWProtectorService64.exe File created C:\Windows\SysWOW64\TDCommonLib64.dll PCWProtectorService64.exe File created C:\Windows\SysWOW64\WMlogo.bmp PCWProtectorService64.exe File created C:\Windows\SysWOW64\TftLib.dll PCWProtectorService64.exe File created C:\Windows\SysWOW64\TDepend.exe PCWProtectorService64.exe File created C:\Windows\SysWOW64\TftLib64.dll PCWProtectorService64.exe File created C:\Windows\SysWOW64\TDepend64.exe PCWProtectorService64.exe File created C:\Windows\SysWOW64\RdUtil.dll PCWProtectorService64.exe -
Drops file in Windows directory 37 IoCs
description ioc Process File opened for modification C:\Windows\Protect\PCWProtector.log PCWProtector.exe File created C:\Windows\Protect\T_Preventup.dll PCWProtectorSetup_Voice_Service.exe File created C:\Windows\Protect\T_Prevent64up.dll PCWProtectorSetup_Voice_Service.exe File created C:\Windows\Protect\TModule64.dll PCWProtectorSetup_Voice_Service.exe File created C:\Windows\Protect\PCWProtector.exe PCWUpdater64.exe File opened for modification C:\Windows\Protect\TDepend64up.exe PCWProtectorService64.exe File created C:\Windows\Protect\PCWUpdater64.exe PCWProtectorSetup_Voice_Service.exe File opened for modification C:\Windows\Protect\RdUtil.dll PCWProtectorService64.exe File created C:\Windows\Protect\PCWProtectorService64.exe PCWUpdater64.exe File opened for modification C:\Windows\Protect\T_Preventup.dll PCWProtectorService64.exe File created C:\Windows\Protect\policy.ini PCWProtectorSetup_Voice_Service.exe File created C:\Windows\Protect\TDepend64up.exe PCWProtectorSetup_Voice_Service.exe File created C:\Windows\Protect\PCWProtectorDummy64.exe PCWProtectorSetup_Voice_Service.exe File created C:\Windows\Protect\PCW.ocx PCWProtectorSetup_Voice_Service.exe File created C:\Windows\Protect\TModule.dll PCWProtectorSetup_Voice_Service.exe File opened for modification C:\Windows\Protect\PCWProtector.log PCWUpdater64.exe File opened for modification C:\Windows\Protect\TDCommonLibup.dll PCWProtectorService64.exe File opened for modification C:\Windows\Protect\TDCommonLib64up.dll PCWProtectorService64.exe File created C:\Windows\Protect\TDCommonLibup.dll PCWProtectorSetup_Voice_Service.exe File created C:\Windows\Protect\PCWProtectorB.exe PCWProtectorSetup_Voice_Service.exe File created C:\Windows\Protect\Uninstall64.exe PCWProtectorSetup_Voice_Service.exe File created C:\Windows\Protect\PCW64.ocx PCWProtectorSetup_Voice_Service.exe File created C:\Windows\Protect\PCWProtectorService64B.exe PCWProtectorSetup_Voice_Service.exe File created C:\Windows\Protect\TDependup.exe PCWProtectorSetup_Voice_Service.exe File opened for modification C:\Windows\Protect\PCWProtectorService64.exe PCWUpdater64.exe File opened for modification C:\Windows\Protect\TftLibup.dll PCWProtectorService64.exe File created C:\Windows\Protect\TftLibup.dll PCWProtectorSetup_Voice_Service.exe File created C:\Windows\Protect\TftLib64up.dll PCWProtectorSetup_Voice_Service.exe File opened for modification C:\Windows\Protect\TftLib64up.dll PCWProtectorService64.exe File opened for modification C:\Windows\Protect\T_Prevent64up.dll PCWProtectorService64.exe File opened for modification C:\Windows\Protect\TDependup.exe PCWProtectorService64.exe File opened for modification C:\Windows\Protect\PCWProtector.log PCWProtectorDummy64.exe File created C:\Windows\Protect\WMlogo.bmp PCWProtectorSetup_Voice_Service.exe File created C:\Windows\Protect\RDUtil.dll PCWProtectorSetup_Voice_Service.exe File created C:\Windows\Protect\TDCommonLib64up.dll PCWProtectorSetup_Voice_Service.exe File opened for modification C:\Windows\Protect\PCWProtector.log PCWProtectorService64.exe File opened for modification C:\Windows\Protect\PCWProtector.log regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\ProgID\ = "PCW.PCWCtrl.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8BF057EB-2D2F-4396-911F-B564A366AAA5}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8BF057EB-2D2F-4396-911F-B564A366AAA5} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{48AAF3B1-ABED-480E-B196-CA325A4E5D03} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\Control regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8BF057EB-2D2F-4396-911F-B564A366AAA5}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\Control regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\Version\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8BF057EB-2D2F-4396-911F-B564A366AAA5}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PCW.PCWCtrl.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\InprocServer32\ = "C:\\Windows\\Protect\\PCW64.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{48AAF3B1-ABED-480E-B196-CA325A4E5D03}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PCW.PCWCtrl.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\TypeLib\ = "{E9662742-1760-4CC7-9BD9-CECFD6F0F594}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8BF057EB-2D2F-4396-911F-B564A366AAA5}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5B331BA4-FE84-4EE4-ACFC-F941B02F6282}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\ = "PCW Control" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E9662742-1760-4CC7-9BD9-CECFD6F0F594}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E9662742-1760-4CC7-9BD9-CECFD6F0F594}\1.0\HELPDIR\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8BF057EB-2D2F-4396-911F-B564A366AAA5}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E9662742-1760-4CC7-9BD9-CECFD6F0F594}\1.0\0\win64\ = "C:\\Windows\\Protect\\PCW64.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E9662742-1760-4CC7-9BD9-CECFD6F0F594}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5B331BA4-FE84-4EE4-ACFC-F941B02F6282} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5B331BA4-FE84-4EE4-ACFC-F941B02F6282}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8BF057EB-2D2F-4396-911F-B564A366AAA5}\ = "_DPCW" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{48AAF3B1-ABED-480E-B196-CA325A4E5D03}\InprocServer32\ = "C:\\Windows\\Protect\\PCW.ocx" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{48AAF3B1-ABED-480E-B196-CA325A4E5D03}\ = "PCW Property Page" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\MiscStatus regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8BF057EB-2D2F-4396-911F-B564A366AAA5}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\TypeLib\ = "{E9662742-1760-4CC7-9BD9-CECFD6F0F594}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\Version\ = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PCW.PCWCtrl.1\ = "PCW Control" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\MiscStatus regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E9662742-1760-4CC7-9BD9-CECFD6F0F594}\1.0\ = "PCW ActiveX ÄÁÆ®·Ñ ¸ðµâ" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E9662742-1760-4CC7-9BD9-CECFD6F0F594}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8BF057EB-2D2F-4396-911F-B564A366AAA5}\ = "_DPCW" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5B331BA4-FE84-4EE4-ACFC-F941B02F6282}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5B331BA4-FE84-4EE4-ACFC-F941B02F6282}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8BF057EB-2D2F-4396-911F-B564A366AAA5} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8BF057EB-2D2F-4396-911F-B564A366AAA5}\TypeLib\ = "{E9662742-1760-4CC7-9BD9-CECFD6F0F594}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{48AAF3B1-ABED-480E-B196-CA325A4E5D03}\ = "PCW Property Page" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\ToolboxBitmap32\ = "C:\\Windows\\Protect\\PCW.ocx, 1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\MiscStatus\1\ = "131473" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\Control\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E9662742-1760-4CC7-9BD9-CECFD6F0F594} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8BF057EB-2D2F-4396-911F-B564A366AAA5}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5B331BA4-FE84-4EE4-ACFC-F941B02F6282}\TypeLib\ = "{E9662742-1760-4CC7-9BD9-CECFD6F0F594}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5B331BA4-FE84-4EE4-ACFC-F941B02F6282}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0A34207-F738-4474-9E89-0A184BD3E947}\MiscStatus\1 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 2524 PCWUpdater64.exe 2524 PCWUpdater64.exe 2524 PCWUpdater64.exe 2524 PCWUpdater64.exe 2524 PCWUpdater64.exe 2524 PCWUpdater64.exe 2524 PCWUpdater64.exe 2524 PCWUpdater64.exe 2524 PCWUpdater64.exe 2524 PCWUpdater64.exe 2524 PCWUpdater64.exe 2524 PCWUpdater64.exe 1132 PCWProtectorService64.exe 1132 PCWProtectorService64.exe 1132 PCWProtectorService64.exe 1132 PCWProtectorService64.exe 1132 PCWProtectorService64.exe 1132 PCWProtectorService64.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 1132 PCWProtectorService64.exe 1132 PCWProtectorService64.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 1132 PCWProtectorService64.exe 1132 PCWProtectorService64.exe 1132 PCWProtectorService64.exe 1132 PCWProtectorService64.exe 1132 PCWProtectorService64.exe 1132 PCWProtectorService64.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 1132 PCWProtectorService64.exe 1132 PCWProtectorService64.exe 1132 PCWProtectorService64.exe 1132 PCWProtectorService64.exe 4516 PCWProtectorDummy64.exe 4516 PCWProtectorDummy64.exe 4144 PCWProtectorSetup_Voice_Service.exe 4144 PCWProtectorSetup_Voice_Service.exe 4104 PCWProtector.exe 4104 PCWProtector.exe 4104 PCWProtector.exe 4104 PCWProtector.exe 4104 PCWProtector.exe 4104 PCWProtector.exe 4104 PCWProtector.exe 4104 PCWProtector.exe 4104 PCWProtector.exe 4104 PCWProtector.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 4144 PCWProtectorSetup_Voice_Service.exe Token: SeDebugPrivilege 4144 PCWProtectorSetup_Voice_Service.exe Token: SeDebugPrivilege 4144 PCWProtectorSetup_Voice_Service.exe Token: SeDebugPrivilege 4144 PCWProtectorSetup_Voice_Service.exe Token: SeDebugPrivilege 4144 PCWProtectorSetup_Voice_Service.exe Token: SeDebugPrivilege 4144 PCWProtectorSetup_Voice_Service.exe Token: SeDebugPrivilege 4144 PCWProtectorSetup_Voice_Service.exe Token: SeDebugPrivilege 4144 PCWProtectorSetup_Voice_Service.exe Token: SeDebugPrivilege 4144 PCWProtectorSetup_Voice_Service.exe Token: SeDebugPrivilege 4144 PCWProtectorSetup_Voice_Service.exe Token: SeDebugPrivilege 4144 PCWProtectorSetup_Voice_Service.exe Token: SeDebugPrivilege 4144 PCWProtectorSetup_Voice_Service.exe Token: SeDebugPrivilege 4144 PCWProtectorSetup_Voice_Service.exe Token: SeDebugPrivilege 4144 PCWProtectorSetup_Voice_Service.exe Token: SeDebugPrivilege 2524 PCWUpdater64.exe Token: SeDebugPrivilege 2524 PCWUpdater64.exe Token: SeDebugPrivilege 1132 PCWProtectorService64.exe Token: SeDebugPrivilege 4500 regsvr32.exe Token: SeDebugPrivilege 4144 PCWProtectorSetup_Voice_Service.exe Token: SeDebugPrivilege 4144 PCWProtectorSetup_Voice_Service.exe Token: SeDebugPrivilege 4144 PCWProtectorSetup_Voice_Service.exe Token: SeDebugPrivilege 4516 PCWProtectorDummy64.exe Token: SeDebugPrivilege 4144 PCWProtectorSetup_Voice_Service.exe Token: SeDebugPrivilege 4104 PCWProtector.exe Token: SeDebugPrivilege 4144 PCWProtectorSetup_Voice_Service.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2524 PCWUpdater64.exe 2524 PCWUpdater64.exe 4516 PCWProtectorDummy64.exe 4516 PCWProtectorDummy64.exe 4104 PCWProtector.exe 4104 PCWProtector.exe 4104 PCWProtector.exe 4104 PCWProtector.exe 4104 PCWProtector.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4144 wrote to memory of 2524 4144 PCWProtectorSetup_Voice_Service.exe 89 PID 4144 wrote to memory of 2524 4144 PCWProtectorSetup_Voice_Service.exe 89 PID 4144 wrote to memory of 4500 4144 PCWProtectorSetup_Voice_Service.exe 97 PID 4144 wrote to memory of 4500 4144 PCWProtectorSetup_Voice_Service.exe 97 PID 4144 wrote to memory of 4500 4144 PCWProtectorSetup_Voice_Service.exe 97 PID 4144 wrote to memory of 4092 4144 PCWProtectorSetup_Voice_Service.exe 98 PID 4144 wrote to memory of 4092 4144 PCWProtectorSetup_Voice_Service.exe 98 PID 4144 wrote to memory of 4092 4144 PCWProtectorSetup_Voice_Service.exe 98 PID 4092 wrote to memory of 4496 4092 regsvr32.exe 99 PID 4092 wrote to memory of 4496 4092 regsvr32.exe 99 PID 1132 wrote to memory of 4516 1132 PCWProtectorService64.exe 101 PID 1132 wrote to memory of 4516 1132 PCWProtectorService64.exe 101 PID 4516 wrote to memory of 4104 4516 PCWProtectorDummy64.exe 102 PID 4516 wrote to memory of 4104 4516 PCWProtectorDummy64.exe 102 PID 4516 wrote to memory of 4104 4516 PCWProtectorDummy64.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\PCWProtectorSetup_Voice_Service.exe"C:\Users\Admin\AppData\Local\Temp\PCWProtectorSetup_Voice_Service.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\Protect\PCWUpdater64.exeC:\Windows\Protect\PCWUpdater64.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2524
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Windows\Protect\PCW.ocx"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Windows\Protect\PCW64.ocx"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\system32\regsvr32.exe/s "C:\Windows\Protect\PCW64.ocx"3⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:4496
-
-
-
C:\Windows\Protect\PCWProtectorService64.exeC:\Windows\Protect\PCWProtectorService64.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\Protect\PCWProtectorDummy64.exeC:\Windows\Protect\PCWProtectorDummy64.exe 12⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\Protect\PCWProtector.exeC:\Windows\Protect\PCWProtector.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4104
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
262KB
MD58240bee02c3ad64fe256a67479de886c
SHA1afb6f7fede3ef1509b1be979dd3ca1ce5ea03db6
SHA256d0a7db3315f28a3b1016b21a78d30b71d961b5979d50635c716df5c11fd1351e
SHA51234170981f78f77814c6869f3833631726c869ddab28827260d3a9ab9fd9b899414f53a7c94517cf25afebb883e2638190c1b396259fead3cb3dc1f123b94ad33
-
Filesize
37B
MD5fe66a57578e17ad360ab1a5ee9508730
SHA1e3a6c924df65990dcf271caa04cf82746a30f07a
SHA256226ca4ce9e25d28d691c3430a706d9a20095aec6a2b479167a29ca2dbdceb621
SHA512634becc06bbb328c85d0ae34416f754f0d7ac324311a2c833fa4d9f55810749d7786ec5d60e5627425372f412f1d805eede882198569dd9eddd29e45476017af
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
526B
MD5e7df52de33f444f384927015d2398f7d
SHA167dabc82a3a79e4d73e3c9213357b9e3f13c5fec
SHA256264d17337388c665062836df19b022473ecc16b83f4b33f497f4344f8d2b493f
SHA512d9c25c571b3be3eedb8ff238eaf5d638bcbaa371fc6c3bbd239b2af8bab016bdbbd87e7c938e52c32939e4777bd9c3e48b2cdc84f51073ac996bbf4db3fb9811
-
Filesize
399KB
MD5074b45a78113cf096d43187a5d38bbb6
SHA1d31653a23df8e96c1f3f0f46a6178e8c3b05dcb5
SHA2560b26f0cdc7dedcda0668ba6628aa9d3774ed5c97c7801c18b582cf4f43367f7c
SHA512725755591e127e809be2aa7b3262178328257ff49f7666cb1005cdecb56b37936ca9b5cf83c3c343851f8c0063664def10efd9b183d94e78fcbbf46945e66c89
-
Filesize
524KB
MD561b0ff9ac09a1da24fc7c08d22f5a33d
SHA19a3411af07a241d6a5fd482d3ade8d7872944d60
SHA25668ab12650aaefa3933928ac44ab01451c8923dfdf10b309c5723affe2c946550
SHA5122d954b764c9e793f203a07a20df6fb7fe0044652ffe61053d55872c2763708039514ee2cc13fa67bf9070d2ab93b54227681e86f663a9f4df5f711d89f4045ef
-
Filesize
1KB
MD58962d05d5f5dc906ee9ce5e1ec6c43fd
SHA1e12a8f0d4d56b6e22c39e2b3dbdae273c280c8ce
SHA25661f476867130dbd1220be089af211195f7a985d42693ceb6af07f06ef2139c89
SHA512584165dde38722182eb8fb4eeb54511d2c43c511ffdaed0b79f448d79503416f35c7fc483263787a6ea1f2d8b39c3677ed209bcbdbc5844635f878b0e74264a6
-
Filesize
197B
MD5aee36fbec57004cf76dc75b85589ff9a
SHA14e6fa447fcdef19f7bc07391c9933346ea0883ae
SHA25630600847a12f55ef7f14d273d1586c3ddc0a3e1c2ecdf097d0fbc9fbf818db2e
SHA5126f2348c083ae128ba6e6713ecc85bab53b9a06d22e200125928d19535dccdbab1a3571a4c8ed0873c520f24b6e18a2f3e7024cb70826353f9d39c22e22631131
-
Filesize
672B
MD5e1a00e3524a0586575c081476eb9ed55
SHA137bf8f94d9e7ac720f97952bac78d951a918e809
SHA256f9639b98727ca517279fff5fab23f17ac6133ef53fd200778786b69811ecf311
SHA512204580c45df953ac5dbcea352ba4910fef49f38bc3114a5074d1238b9ca27abb062e6d41f8a2024d4830d780f3ffb1d5406936089a763d0ede207a10c0854bfa
-
Filesize
567KB
MD56ce74b64aee3c89d3939bb15ecfe7888
SHA158ec5c6b43b90aaa6fa7919c1dbf46812378efae
SHA256ccb0bd5f3e296c35b38348cf4f231f93ce9bb57af42c328b0aba9e29103ee391
SHA512f39486655c3d58a62d5c310ce181da0f7dee61e2d3179571b6c1e25ceba3b20c9061565708b8e7c5c5232ca3210348ed82305a105b3b678fadef7b62a2be8c64
-
Filesize
501KB
MD54e4009a8838142a76a1d3b7e9a72b0a2
SHA1fce0ef120d20a322afbc0a0e8c942c69f2218e85
SHA2563668f959946e719f5a72cc7c5311adf9e8dc5a13d94ca6e0b994d3a520adf881
SHA512186de07c13518bbffc8eae9857228a4b51080fe409cd7499d9a9c1575a9cd2229c1d20418f121380e7b730ea9404595070b1b4f7ad55354472a9de49ac5a2d17
-
Filesize
287KB
MD5eb2aa21de1026a8a831af0797aac9a78
SHA10e5e03f209a50a46ac14246ae46ef19ee14d7233
SHA25682c4c819c4d543f6131cbc462206e9cdaf4931abe6f73c21b6df4968897572a2
SHA51289758110eef34b9c08b09cfb10569b0ce4b16788dc68029c12fda84859240d514d2a41827a61e99b9e2a8f1be1ce251a2fd8aeba990dfbb176158f6096ad11e2
-
Filesize
520KB
MD5506ce3ed7e4ee4d42c05482ebd9e230f
SHA14eb0d15002fad41803818600aa24002581b40bfa
SHA25629ecf971c9d8b5301171b6f786164a1cea29fbf27e20949635e4b95307b2880b
SHA5121997a7406afee2c460200addd76aca44478df66a5f5e16d153d4ff6e4e9e2b83fca12f338b4c6a55dfad843dfae243d005d7ef1f3870b376cfe8b21ff83dd74c
-
Filesize
274KB
MD547c45dc36bbf3c5e6130dcfe37c89347
SHA15098af2483b5e2edf205bca47d43b086ddfd8d9d
SHA2566f149b8ff0e97d0d2dcae5a952e6bdbc6222116eb2f865c7129f32f3fd3c5fa2
SHA512f99724202d538a554c1bc591f7d50fe3362f42b66d243b8875a4f5d9cece8b817b6d8db35c35a2016b3268be1d0f92fff12127d1ef91be784b563a88e9902c41
-
Filesize
249KB
MD50e00def51125c6b54261001e3bacc19d
SHA1a361eae15275148b77f8e168bba93e05bb04abe4
SHA256b5945295ba8cb45903c77057b13d09c80dbd6a31eb64cff1d3a7d486e02d57a1
SHA512597b83237db5677044ede9eb71e984bc5347e64ab86780707942a8375e4a7fb700e387f10f4dbf392367bdd7ce2ce79db0877f8422ff59e79f046691cdb52aca
-
Filesize
490KB
MD5b48cdc4af3bda1f3c5fc02deb759cfa2
SHA1a007d162d5de321cfe7504c4d5212dc139f54fb0
SHA256dfabe6784c2ab53bac3e579853449a3f57e291dd16af2fc56ebb84a56e8853aa
SHA51233cc0c7336b8651005cebd466795d90a4a66720267756652c347593868f13fb59d601c46353d714f50fb5f47c21f1c107ca3212f42f743fe725d128e8f3a0496
-
Filesize
387KB
MD56581da8becde34bd00604ae3a34fdf22
SHA1310597bc32305530b9864ad517cdab915bb8310e
SHA256a46584ab1229da1cf3b16a47e90a651b5d385e5b1c7b61d63e27d0b89148687a
SHA5126e6e0478075639ebd105c3f8201646c5728be724311ee02500ccf0295e042b57ae072a2e694be5820df44aa47466f687960056ad8bb93e060301ba4f61be0264
-
Filesize
309KB
MD5d85f0082a012d73167921468731d1503
SHA143e6814e086b8385a3c03fc16526ab39adb7983a
SHA25685235decb50cb8075a305d42809eb76f2237368d7e8155bc01cb8037c9caa18c
SHA5123dbf52b866514c0b86fcc5752fc136d71bb4a802342801d64fe0127dfffcb6b8437e89d17fa81489c7cfcddf1c97908f1e1cdeeda67b0a1aabc48e8c78376849
-
Filesize
258KB
MD5c84ed9fe6e818185b971a6d10f0c16b7
SHA195daabafe876ebea94b24f8389ca6b0c8330e4af
SHA2562a3324961c95098164646161108231510135f461d73e8ff07a1ee1216fff286f
SHA512f1ffbeb198d3974afc03a4c5ca466cfb325db305e6bcb48852816e2bb1a516c441ece2bd74aaecce1e2597d59219e2b2e60c880bf2a98d7634138257ac90d3d4
-
Filesize
303KB
MD569848fcf204e88745974c7650c4cb133
SHA1cabb555c3bd71277e61eb5578267e359fd4b0809
SHA2564cbec29c1857389174f7cd2e52d09b18307f1f58e8587c5102b12ea827a08423
SHA51226086752234fdc212155620adf50ac6853b4b0515b5bd861a07bbf0eb6eff93c1838fc2911a471912f28195355438198c28eb0d9cef51774e010b79fda4627a2
-
Filesize
254KB
MD57bc750a3e94403913851e41f1028a832
SHA1d035d67133c760b48522713bd3158ec2bf17fcbc
SHA25664aaa65abb2d5cfd49c96d349dec267e904457ec70c91fa64d0ee60b0b155817
SHA5128de51b3bb24cedf37a8a138f5c6177d3f8ad3602b81d387a129b2a7662c53ffe91afbba09b9f26844de535bab29ade8da7e25621efbc032e903882dda3974d61
-
Filesize
210KB
MD5dc27cb08c2e57eb137797d6ceab3f23c
SHA10caac5731c117db54d0e5fdb554b5a5c5d1f7d22
SHA25607b7953d1a9b2fac4f4208649ed18ac1cffdca7f68ccbf1373d0e5120d837e95
SHA51251618c56101d5a9fee1806a4ca08f31eaecbd80c53ec21628f297d6d651086384d8e2bdac054240870a2b66af6ee02b3697bcf2df4af059132e495d1295cc4da
-
Filesize
212KB
MD5ac67f6efefd9227789aefa657264508b
SHA1007b50e73b92d34d3f19b96ffbf64f9289f1d4d8
SHA25635a1fe7507c35696348fb28c6f3cb5e9c2fe1a8a6966b0a0b8fd469e521f384d
SHA512af070714a26ccd462933ffc94f8634de8e6e2da57aebf2155444413ae05741e0b6e964a539bb79db893dd75d42339e7f8c2f450c8dc7800fc830f1f606c88f0d