Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 18:46
Static task
static1
Behavioral task
behavioral1
Sample
11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe
Resource
win10v2004-20240508-en
General
-
Target
11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe
-
Size
822KB
-
MD5
1f57fc13c56a4dceed5ef9287677978c
-
SHA1
6960f54e573c33a09e9cbc1c67394dec3237c355
-
SHA256
11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3
-
SHA512
9ddc28dab956886920e83d3ff0847eb3b9163d4f435b23eebffe9dd20775d9a90da59417a36b315cf0e730065663b555819989c913c6e192fc277417dc73603f
-
SSDEEP
6144:XwynAtMrOVRkidy9yIGWlUiJwzYDteYIpREZPF9xkNbyjUWAZyVVp7BnxeHF:XwKfOVRo9yRYzwzYDteYIpREf9eqVUl
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2400 microsoftmicaut.exe 1532 informationmicrosoftr.exe 3028 operatingwindows.exe 2752 systemmsadcer.exe -
Loads dropped DLL 4 IoCs
pid Process 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VisualLilo = "c:\\program files (x86)\\adobe\\reader 9.0\\reader\\coreahclient1.0.0.1.exe" 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EngineOffice = "C:\\Users\\Admin\\AppData\\Local\\Temp\\11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe" 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\EngineSource = "C:\\Users\\Admin\\AppData\\Local\\Temp\\11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe" 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\SystemMicrosoft = "c:\\program files (x86)\\common files\\microsoft shared\\help\\informationmicrosoftr.exe" 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BCSSync = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\BCSSync.exe\" /DelayServices" 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsWindows = "c:\\program files (x86)\\common files\\microsoft shared\\ink\\microsoftmicaut.exe" 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TableTextServiceOperating6.1.7600.16385 = "c:\\program files (x86)\\windows nt\\tabletextservice\\es-es\\operatingwindows.exe" 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoftstintl14.0.4744.1000 = "c:\\program files (x86)\\common files\\microsoft shared\\smart tag\\1033\\officestintl14.0.4744.1000.exe" 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\msadcorWindows = "c:\\program files (x86)\\common files\\system\\msadc\\en-us\\systemmsadcer.exe" 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\ntdll.dll.dll microsoftmicaut.exe File created C:\Windows\SysWOW64\ntdll.dll.dll informationmicrosoftr.exe File created C:\Windows\SysWOW64\ntdll.dll.dll operatingwindows.exe File created C:\Windows\SysWOW64\ntdll.dll.dll systemmsadcer.exe File created C:\Windows\SysWOW64\ntdll.dll.dll 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe -
Drops file in Program Files directory 17 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\es-ES\RCX47F8.tmp 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\InformationMicrosoftR.exe 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\1033\Officestintl14.0.4744.1000.exe 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Coreahclient1.0.0.1.exe 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\RCX5DFC.tmp 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\en-US\RCX5E0D.tmp 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe File created C:\Program Files (x86)\Windows NT\TableTextService\es-ES\OperatingWindows.exe 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\InformationMicrosoftR.exe 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\MSTTSDecWrpTTSEngineCommon.exe 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\es-ES\OperatingWindows.exe 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\RCX4848.tmp 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\ja-JP\MicrosoftMSTTSLoc2.00.4319.007.0907131255.exe 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Coreahclient1.0.0.1.exe 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe File created C:\Program Files (x86)\Common Files\System\msadc\en-US\Systemmsadcer.exe 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\Microsoftmicaut.exe 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\1033\RCX5DBD.tmp 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\RCX4819.tmp 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString systemmsadcer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 microsoftmicaut.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 informationmicrosoftr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString operatingwindows.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier systemmsadcer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString microsoftmicaut.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 operatingwindows.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier operatingwindows.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString informationmicrosoftr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier informationmicrosoftr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 systemmsadcer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier microsoftmicaut.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2400 microsoftmicaut.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 1532 informationmicrosoftr.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 3028 operatingwindows.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2752 systemmsadcer.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2400 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 30 PID 2024 wrote to memory of 2400 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 30 PID 2024 wrote to memory of 2400 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 30 PID 2024 wrote to memory of 2400 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 30 PID 2024 wrote to memory of 2400 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 30 PID 2024 wrote to memory of 2400 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 30 PID 2024 wrote to memory of 2400 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 30 PID 2024 wrote to memory of 1532 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 32 PID 2024 wrote to memory of 1532 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 32 PID 2024 wrote to memory of 1532 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 32 PID 2024 wrote to memory of 1532 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 32 PID 2024 wrote to memory of 1532 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 32 PID 2024 wrote to memory of 1532 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 32 PID 2024 wrote to memory of 1532 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 32 PID 2024 wrote to memory of 3028 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 34 PID 2024 wrote to memory of 3028 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 34 PID 2024 wrote to memory of 3028 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 34 PID 2024 wrote to memory of 3028 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 34 PID 2024 wrote to memory of 3028 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 34 PID 2024 wrote to memory of 3028 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 34 PID 2024 wrote to memory of 3028 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 34 PID 2024 wrote to memory of 2752 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 35 PID 2024 wrote to memory of 2752 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 35 PID 2024 wrote to memory of 2752 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 35 PID 2024 wrote to memory of 2752 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 35 PID 2024 wrote to memory of 2752 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 35 PID 2024 wrote to memory of 2752 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 35 PID 2024 wrote to memory of 2752 2024 11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe"C:\Users\Admin\AppData\Local\Temp\11313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2024 -
\??\c:\program files (x86)\common files\microsoft shared\ink\microsoftmicaut.exe"c:\program files (x86)\common files\microsoft shared\ink\microsoftmicaut.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2400
-
-
\??\c:\program files (x86)\common files\microsoft shared\help\informationmicrosoftr.exe"c:\program files (x86)\common files\microsoft shared\help\informationmicrosoftr.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
\??\c:\program files (x86)\windows nt\tabletextservice\es-es\operatingwindows.exe"c:\program files (x86)\windows nt\tabletextservice\es-es\operatingwindows.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
\??\c:\program files (x86)\common files\system\msadc\en-us\systemmsadcer.exe"c:\program files (x86)\common files\system\msadc\en-us\systemmsadcer.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824KB
MD582110c77edc4f51477e8ae5867930605
SHA1b6b8e60fbb34a35d90c7a3149b9d60eeb56f6e21
SHA25693148b182001a6c3ad694a791588b0b1619d561e0f1ab6f1b4303c993ddf9508
SHA5121d6b575f55a5965f681929572594f45c728de1e120c80192e2a8c6d12a6918500e9a30ee1919bc32f95e0f124b6e90b257e6ddfb25e6975d65937552385da6ce
-
Filesize
822KB
MD51f57fc13c56a4dceed5ef9287677978c
SHA16960f54e573c33a09e9cbc1c67394dec3237c355
SHA25611313ef4a0328466ba28c81b10882b632ba4ff4af99d435cdcdfaf7e6ac562e3
SHA5129ddc28dab956886920e83d3ff0847eb3b9163d4f435b23eebffe9dd20775d9a90da59417a36b315cf0e730065663b555819989c913c6e192fc277417dc73603f