Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 23:19
Behavioral task
behavioral1
Sample
6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe
Resource
win10v2004-20240508-en
General
-
Target
6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe
-
Size
91KB
-
MD5
dc09afef309993489dc3cfa2b0a479e9
-
SHA1
82fcde0622647fcc9288ac271759758a6b12df87
-
SHA256
6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292
-
SHA512
e7f1b2c55d7008ada01131316cfc8947afc7fc52c4c6720f198579739d27e40c19d05aca232c4f06b0cb7f9e69554dd8eaeeaf5a50c02ae383abee539ec7bf8b
-
SSDEEP
1536:ERsjdf1aM67v32Z9x5nouy8VTCRsjdf1aM67v32Z9x5nouy8VTF:EOaHv3YpoutNCOaHv3YpoutNF
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe -
UPX dump on OEP (original entry point) 32 IoCs
resource yara_rule behavioral1/memory/2272-0-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/files/0x0007000000015e02-8.dat UPX behavioral1/files/0x0006000000018b15-109.dat UPX behavioral1/memory/552-111-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/552-116-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/files/0x0006000000018b4a-122.dat UPX behavioral1/memory/1808-123-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/1808-126-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/files/0x0006000000018b73-133.dat UPX behavioral1/files/0x0006000000018b96-144.dat UPX behavioral1/memory/1812-150-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/2272-157-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/1956-174-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/2272-216-0x0000000002430000-0x000000000245F000-memory.dmp UPX behavioral1/files/0x0006000000018b4a-227.dat UPX behavioral1/files/0x0006000000018b73-230.dat UPX behavioral1/files/0x0006000000018b96-250.dat UPX behavioral1/memory/3060-266-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/files/0x0006000000018d06-267.dat UPX behavioral1/files/0x00050000000192c9-284.dat UPX behavioral1/memory/1760-294-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/1336-277-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/1336-276-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/files/0x0006000000018ba2-259.dat UPX behavioral1/memory/1132-263-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/2588-245-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/2076-233-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/3056-222-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/files/0x0006000000018b15-215.dat UPX behavioral1/memory/2468-137-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/2272-442-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/2272-445-0x0000000002430000-0x000000000245F000-memory.dmp UPX -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 12 IoCs
pid Process 552 xk.exe 1808 IExplorer.exe 2468 WINLOGON.EXE 1812 CSRSS.EXE 1956 SERVICES.EXE 3056 xk.exe 2076 IExplorer.exe 2588 WINLOGON.EXE 1132 CSRSS.EXE 3060 SERVICES.EXE 1336 LSASS.EXE 1760 SMSS.EXE -
Loads dropped DLL 20 IoCs
pid Process 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe -
resource yara_rule behavioral1/memory/2272-0-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0007000000015e02-8.dat upx behavioral1/files/0x0006000000018b15-109.dat upx behavioral1/memory/552-111-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/552-116-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0006000000018b4a-122.dat upx behavioral1/memory/1808-123-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1808-126-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0006000000018b73-133.dat upx behavioral1/files/0x0006000000018b96-144.dat upx behavioral1/memory/1812-150-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2272-157-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1956-174-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2272-216-0x0000000002430000-0x000000000245F000-memory.dmp upx behavioral1/files/0x0006000000018b4a-227.dat upx behavioral1/files/0x0006000000018b73-230.dat upx behavioral1/files/0x0006000000018b96-250.dat upx behavioral1/memory/3060-266-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0006000000018d06-267.dat upx behavioral1/files/0x00050000000192c9-284.dat upx behavioral1/memory/1760-294-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1336-277-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1336-276-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0006000000018ba2-259.dat upx behavioral1/memory/1132-263-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2588-245-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2076-233-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/3056-222-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0006000000018b15-215.dat upx behavioral1/memory/2468-137-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2272-442-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2272-445-0x0000000002430000-0x000000000245F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\desktop.ini 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File created C:\desktop.ini 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened for modification F:\desktop.ini 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File created F:\desktop.ini 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened (read-only) \??\L: 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened (read-only) \??\S: 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened (read-only) \??\W: 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened (read-only) \??\Y: 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened (read-only) \??\O: 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened (read-only) \??\R: 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened (read-only) \??\T: 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened (read-only) \??\E: 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened (read-only) \??\I: 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened (read-only) \??\K: 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened (read-only) \??\Q: 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened (read-only) \??\V: 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened (read-only) \??\B: 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened (read-only) \??\G: 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened (read-only) \??\J: 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened (read-only) \??\M: 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened (read-only) \??\N: 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened (read-only) \??\P: 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened (read-only) \??\U: 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened (read-only) \??\X: 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened (read-only) \??\Z: 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File created C:\Windows\system32\perfh009.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00A.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\IExplorer.exe 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File created C:\Windows\SysWOW64\PerfStringBackup.TMP OUTLOOK.EXE File created C:\Windows\system32\perfc007.dat OUTLOOK.EXE File created C:\Windows\system32\perfh007.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00C.dat OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\shell.exe 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File created C:\Windows\SysWOW64\shell.exe 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened for modification C:\Windows\SysWOW64\PerfStringBackup.INI OUTLOOK.EXE File created C:\Windows\system32\perfh011.dat OUTLOOK.EXE File created C:\Windows\system32\perfc011.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\Mig2.scr 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File created C:\Windows\system32\perfc009.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfc010.dat OUTLOOK.EXE File created C:\Windows\system32\perfh010.dat OUTLOOK.EXE -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File created C:\Windows\inf\Outlook\0009\outlperf.ini OUTLOOK.EXE File opened for modification C:\Windows\xk.exe 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File created C:\Windows\xk.exe 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File created C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\ 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" OUTLOOK.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" OUTLOOK.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" OUTLOOK.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DD-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063002-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DC-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630C2-0000-0000-C000-000000000046}\ = "Conflicts" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006300D-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D9-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CA-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063073-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F1-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E2-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630C8-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063077-0000-0000-C000-000000000046}\ = "ItemsEvents" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630B2-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063039-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063007-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CC-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CF-0000-0000-C000-000000000046}\ = "_RuleAction" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D7-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DE-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063008-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006309A-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F7-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DA-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672ED-0000-0000-C000-000000000046}\ = "_OlkBusinessCardControl" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F9-0000-0000-C000-000000000046}\ = "OlkPageControlEvents" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E5-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630C2-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063085-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063070-0000-0000-C000-000000000046}\ = "_OutlookBarPane" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063021-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E7-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630FB-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063033-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006307B-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F1-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D0-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D5-0000-0000-C000-000000000046}\ = "_PlaySoundRuleAction" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E0-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006308C-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063025-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006309A-0000-0000-C000-000000000046}\ = "_OrderFields" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006303E-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D2-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006300C-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630A0-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DC-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D1-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006300C-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063078-0000-0000-C000-000000000046}\ = "ExplorersEvents" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063074-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006309E-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D8-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006303A-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006307A-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630B2-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063025-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063025-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063107-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DA-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D7-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630FA-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630EF-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063107-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1744 OUTLOOK.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1744 OUTLOOK.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1744 OUTLOOK.EXE 1744 OUTLOOK.EXE 1744 OUTLOOK.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1744 OUTLOOK.EXE 1744 OUTLOOK.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 552 xk.exe 1808 IExplorer.exe 2468 WINLOGON.EXE 1812 CSRSS.EXE 1956 SERVICES.EXE 3056 xk.exe 2076 IExplorer.exe 2588 WINLOGON.EXE 1132 CSRSS.EXE 3060 SERVICES.EXE 1336 LSASS.EXE 1760 SMSS.EXE 1744 OUTLOOK.EXE -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2272 wrote to memory of 552 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 28 PID 2272 wrote to memory of 552 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 28 PID 2272 wrote to memory of 552 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 28 PID 2272 wrote to memory of 552 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 28 PID 2272 wrote to memory of 1808 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 29 PID 2272 wrote to memory of 1808 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 29 PID 2272 wrote to memory of 1808 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 29 PID 2272 wrote to memory of 1808 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 29 PID 2272 wrote to memory of 2468 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 30 PID 2272 wrote to memory of 2468 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 30 PID 2272 wrote to memory of 2468 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 30 PID 2272 wrote to memory of 2468 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 30 PID 2272 wrote to memory of 1812 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 31 PID 2272 wrote to memory of 1812 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 31 PID 2272 wrote to memory of 1812 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 31 PID 2272 wrote to memory of 1812 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 31 PID 2272 wrote to memory of 1956 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 32 PID 2272 wrote to memory of 1956 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 32 PID 2272 wrote to memory of 1956 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 32 PID 2272 wrote to memory of 1956 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 32 PID 2272 wrote to memory of 3056 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 33 PID 2272 wrote to memory of 3056 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 33 PID 2272 wrote to memory of 3056 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 33 PID 2272 wrote to memory of 3056 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 33 PID 2272 wrote to memory of 2076 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 34 PID 2272 wrote to memory of 2076 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 34 PID 2272 wrote to memory of 2076 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 34 PID 2272 wrote to memory of 2076 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 34 PID 2272 wrote to memory of 2588 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 35 PID 2272 wrote to memory of 2588 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 35 PID 2272 wrote to memory of 2588 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 35 PID 2272 wrote to memory of 2588 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 35 PID 2272 wrote to memory of 1132 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 36 PID 2272 wrote to memory of 1132 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 36 PID 2272 wrote to memory of 1132 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 36 PID 2272 wrote to memory of 1132 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 36 PID 2272 wrote to memory of 3060 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 37 PID 2272 wrote to memory of 3060 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 37 PID 2272 wrote to memory of 3060 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 37 PID 2272 wrote to memory of 3060 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 37 PID 2272 wrote to memory of 1336 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 38 PID 2272 wrote to memory of 1336 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 38 PID 2272 wrote to memory of 1336 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 38 PID 2272 wrote to memory of 1336 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 38 PID 2272 wrote to memory of 1760 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 39 PID 2272 wrote to memory of 1760 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 39 PID 2272 wrote to memory of 1760 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 39 PID 2272 wrote to memory of 1760 2272 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 39 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe"C:\Users\Admin\AppData\Local\Temp\6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2272 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:552
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1808
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2468
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1812
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1956
-
-
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3056
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2076
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2588
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1132
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3060
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1336
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1760
-
-
C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1744
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD548dd6cae43ce26b992c35799fcd76898
SHA18e600544df0250da7d634599ce6ee50da11c0355
SHA2567bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a
SHA512c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31
-
Filesize
91KB
MD5a604f673c1f314de2810a39cf8f0e1db
SHA104834a05ad4db23445d651df14d1130d6282bc1c
SHA2561e8324f454850ab9bba5860c015e353f37e4999ae0423888c6fc28ec8a38ae67
SHA5125529cca60678054a5c1a06419761c87bb9409e3a5933a82936ed1c5c15c4bd1b898484898f65a782bc77a09df36df69efbf9cb2b1c344d3348729136cd5d191c
-
Filesize
91KB
MD5372eb9218619c18ba7ddca8825301f12
SHA132fc5646563fc9e60d32bb43a3755c72ccfd6bfe
SHA256147121c969d3e0b986fd7a9098f1a66819f336d9eddf0c7c256184daeb2f706f
SHA512cda9184c1b10d28ec4b5563cb50a1cc4b09fddce05f9d7f0d34da4f1088e479bc42585f63429cd8c9850e55baec37582df90b291fd3ecf69d160bddfa1aa1d8b
-
Filesize
91KB
MD5d3107519903cb5d14803be631fbd55e6
SHA1dc3529f534029936d42c5d3eceb897c0ab24f4d9
SHA2569507016b71cece4104642adc213161e1d146ccd7f9d8f5f1e35417e0796c072f
SHA51238c82cce7be63caa53875019b9b19c6d6d7dff2fc896d5e423fbcff6e12645945d0be10947454f29b30db0cfc5be1360838d771178a6c3a28fd4b33ac6a4ac0a
-
Filesize
91KB
MD5d9afb3ac9924f9e8612e4e01d2394d07
SHA12bb017c8f872c27c864efb919c352e8765736f2a
SHA2568d69aff27a52c9e06b615ba71330e8097a030d3f3055a6ca5c034314ff0cb894
SHA5129bec35c3989cde0cb3312c3b2d6f39bbab4af594671cf2923f6d88e8bfdd967a258cf2675dd9474735f4d4b847139bc03522090ccfed1ab0f26f5bc0bfdb2ac6
-
Filesize
91KB
MD50f1b86047d74b8a8e254bb48f8af1697
SHA1e2e58973e7db063e502b8c9afd3fa9098e5cd36d
SHA25691ce9bb0995894fae86fcb6d17f8e1028688b269412eafe2a5004213a77b90e1
SHA5127513eeb54020634f4597463e10db0b8ae4b0433f6726266b5027446b3a82ae2eb3b1ab9326e1587066741248044335828c67ccf95d2e3e0e27fe624950b53660
-
Filesize
91KB
MD5dc09afef309993489dc3cfa2b0a479e9
SHA182fcde0622647fcc9288ac271759758a6b12df87
SHA2566ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292
SHA512e7f1b2c55d7008ada01131316cfc8947afc7fc52c4c6720f198579739d27e40c19d05aca232c4f06b0cb7f9e69554dd8eaeeaf5a50c02ae383abee539ec7bf8b
-
Filesize
91KB
MD5e242ca35733f7184befed113d9b888e3
SHA1f7493a5dbb87c2c57905522cce442f1c20db856f
SHA256feb05d6ff693d9dc37a932e1094a53e54d0600c00289d3afed6fa41bb0381bd7
SHA51250ebb727d7f2783d8b310711d23abb7b04a87493afe9d331bbb445ba094a8cb5e43e33ac6b759b912462fb8370ab25d0753836782be7e27950495bf8165516d2
-
Filesize
91KB
MD55d62fdfcd72394a9c1f7ed2193487edb
SHA1c992d5ac289aaf4062ebd46534478985903c622a
SHA2561751836925b742ecf7ad9081c79b7cf112a8ca327cdb84010caff2b6b286dd82
SHA5125ff3193514956ff272bf15551a1c3fee5bbf908fc4deb4c56a08cf35ceb723c3b089d9d6535c2c69c244f90b9825a0aecd4639a5e3fd6fd80c6b70bb90513b90
-
Filesize
91KB
MD5089d8d383a42376d1c19c25e6d34cbe3
SHA1512271cb114200de242090d4709d6b9b39d67ad4
SHA256f874b17d003359a62dc3cf334fcac8564cb905dbe4eedd59029a9aa95818ab76
SHA5124b782b53ed426216f3b05d5802ceaf8fa4d2d4977636c9fb40029d2196410f6e3e2223e1602d28e46df7d42401d6ca820df497e48fffa2648f8dbcf8068a8c80
-
Filesize
91KB
MD5df3b689257432156cec6122b3e08e1c3
SHA19f88bf26cad4b33b400bc0372f969df322149742
SHA2560163288abfdbd06e1fb52541235952aa400d82fb72dfb805cae265d92778d70e
SHA51209ce96f0ef35e3ef42f98fb8e8f30538ae55f50e87b6003210a528a797325d94a8d6ff7bcfef35999c055ac5d4e4d1ce6253dbd6d67850bac1fdf856935b013c
-
Filesize
91KB
MD59b47f85b5a75dd2ffda3b9151ad110db
SHA1158c562a5afe5a29338efc86bca9aa67ee1b5005
SHA25636ad76bc914faacd96ec6bfb734879dd5c7df66a0db3aae7ab8a5abadd79327b
SHA512adc75fbd97f52844178e9f8d3c526a7d17807bd4a759ddd76674cac062c3fb40360e3e490b6340f6133c9b4a9491c7fef0f282d6c814b89b0ae33bafa06c3468
-
Filesize
91KB
MD5b2c37b03aa375b8f894519a0ddde970e
SHA1c40ae8de2c602e4ab090b13c93d6aa7e1b492384
SHA2564749c9c79ed3892e5e70327cc5aca037db3477966701ceee64d46ef6c2a959cd
SHA5121a505d311db2a9ea9904bf8af3cc5bfe0929a53d409e7163f40cda8b2228256863de0093634211b09109579e16d4eed353e1121db6a7f998ce6c2d9730f86e34