Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 19:27
Static task
static1
Behavioral task
behavioral1
Sample
0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe
Resource
win10v2004-20240508-en
General
-
Target
0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe
-
Size
97KB
-
MD5
26f62a6cc9fcd51786bb9f650254e8f0
-
SHA1
4e1c14b29498ff62563b3c646d6dc55d5662491c
-
SHA256
0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab
-
SHA512
2059661ebe77af71bfec0994b283c6f4a42e6f375a9f74d90242edd025ef44413b89e397b47a707134123fecbf59328446f23738c84a7a1a87134acfb8bfbdd7
-
SSDEEP
1536:4a3+ddygX7y9v7Z+NoykJHBOAFRfBjG3YdoI8:J8dfX7y9DZ+N7eB+tI8
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 8 IoCs
Processes:
SVCHOST.EXESVCHOST.EXE0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exeSPOOLSV.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\Fonts\\\u00a0Explorer.exe\"" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\Fonts\\\u00a0Explorer.exe\"" 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\Fonts\\\u00a0Explorer.exe\"" SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\Fonts\\\u00a0Explorer.exe\"" SVCHOST.EXE -
Modifies visibility of file extensions in Explorer 2 TTPs 4 IoCs
Processes:
SPOOLSV.EXESVCHOST.EXESVCHOST.EXE0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SPOOLSV.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SVCHOST.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SVCHOST.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 4 IoCs
Processes:
SPOOLSV.EXESVCHOST.EXESVCHOST.EXE0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SPOOLSV.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SVCHOST.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SVCHOST.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe -
Executes dropped EXE 12 IoCs
Processes:
SVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESPOOLSV.EXESVCHOST.EXESVCHOST.EXESPOOLSV.EXESPOOLSV.EXESVCHOST.EXESPOOLSV.EXEpid process 1860 SVCHOST.EXE 1988 SVCHOST.EXE 4932 SVCHOST.EXE 2724 SVCHOST.EXE 5612 SVCHOST.EXE 5660 SPOOLSV.EXE 1764 SVCHOST.EXE 4940 SVCHOST.EXE 5384 SPOOLSV.EXE 3428 SPOOLSV.EXE 3488 SVCHOST.EXE 2412 SPOOLSV.EXE -
Drops desktop.ini file(s) 2 IoCs
Processes:
0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exedescription ioc process File opened for modification C:\Recycled\desktop.ini 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe File opened for modification F:\Recycled\desktop.ini 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
SPOOLSV.EXESVCHOST.EXESVCHOST.EXE0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exedescription ioc process File opened (read-only) \??\I: SPOOLSV.EXE File opened (read-only) \??\V: SPOOLSV.EXE File opened (read-only) \??\N: SVCHOST.EXE File opened (read-only) \??\G: SVCHOST.EXE File opened (read-only) \??\V: SVCHOST.EXE File opened (read-only) \??\Z: SVCHOST.EXE File opened (read-only) \??\H: 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe File opened (read-only) \??\Z: SVCHOST.EXE File opened (read-only) \??\R: SVCHOST.EXE File opened (read-only) \??\S: SVCHOST.EXE File opened (read-only) \??\J: SPOOLSV.EXE File opened (read-only) \??\L: 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe File opened (read-only) \??\Y: 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe File opened (read-only) \??\L: SVCHOST.EXE File opened (read-only) \??\X: SVCHOST.EXE File opened (read-only) \??\P: SPOOLSV.EXE File opened (read-only) \??\U: SPOOLSV.EXE File opened (read-only) \??\E: 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe File opened (read-only) \??\P: SVCHOST.EXE File opened (read-only) \??\X: SVCHOST.EXE File opened (read-only) \??\T: SPOOLSV.EXE File opened (read-only) \??\P: SVCHOST.EXE File opened (read-only) \??\L: SPOOLSV.EXE File opened (read-only) \??\N: SPOOLSV.EXE File opened (read-only) \??\Y: SPOOLSV.EXE File opened (read-only) \??\M: SVCHOST.EXE File opened (read-only) \??\R: SVCHOST.EXE File opened (read-only) \??\J: SVCHOST.EXE File opened (read-only) \??\N: SVCHOST.EXE File opened (read-only) \??\H: SVCHOST.EXE File opened (read-only) \??\W: SPOOLSV.EXE File opened (read-only) \??\I: 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe File opened (read-only) \??\H: SVCHOST.EXE File opened (read-only) \??\I: SVCHOST.EXE File opened (read-only) \??\T: SVCHOST.EXE File opened (read-only) \??\Y: SVCHOST.EXE File opened (read-only) \??\Q: SVCHOST.EXE File opened (read-only) \??\S: SPOOLSV.EXE File opened (read-only) \??\Z: SPOOLSV.EXE File opened (read-only) \??\J: 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe File opened (read-only) \??\N: 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe File opened (read-only) \??\W: 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe File opened (read-only) \??\X: 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe File opened (read-only) \??\L: SVCHOST.EXE File opened (read-only) \??\E: SPOOLSV.EXE File opened (read-only) \??\R: SPOOLSV.EXE File opened (read-only) \??\K: 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe File opened (read-only) \??\O: 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe File opened (read-only) \??\Q: 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe File opened (read-only) \??\W: SVCHOST.EXE File opened (read-only) \??\U: 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe File opened (read-only) \??\U: SVCHOST.EXE File opened (read-only) \??\K: SVCHOST.EXE File opened (read-only) \??\T: SVCHOST.EXE File opened (read-only) \??\M: SPOOLSV.EXE File opened (read-only) \??\O: SPOOLSV.EXE File opened (read-only) \??\R: 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe File opened (read-only) \??\S: 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe File opened (read-only) \??\V: 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe File opened (read-only) \??\V: SVCHOST.EXE File opened (read-only) \??\X: SPOOLSV.EXE File opened (read-only) \??\G: SPOOLSV.EXE File opened (read-only) \??\Q: SPOOLSV.EXE File opened (read-only) \??\K: SVCHOST.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\Root\VFS\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\docicon.exe 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe -
Drops file in Windows directory 4 IoCs
Processes:
0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exeSVCHOST.EXESVCHOST.EXESPOOLSV.EXEdescription ioc process File opened for modification C:\Windows\Fonts\ Explorer.exe 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe File opened for modification C:\Windows\Fonts\ Explorer.exe SVCHOST.EXE File opened for modification C:\Windows\Fonts\ Explorer.exe SVCHOST.EXE File opened for modification C:\Windows\Fonts\ Explorer.exe SPOOLSV.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 29 IoCs
Processes:
SVCHOST.EXESVCHOST.EXESPOOLSV.EXE0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\*\InfoTip = "prop:Type;Write;Size" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\*\QuickTip = "prop:Type;Size" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" SVCHOST.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\CONFIG\COMMAND 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\INSTALL 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ SPOOLSV.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\CONFIG 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\*\TileInfo = "prop:Type;Size" SPOOLSV.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\INSTALL\COMMAND 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\*\TileInfo = "prop:Type;Size" 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\*\InfoTip = "prop:Type;Write;Size" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\*\QuickTip = "prop:Type;Size" 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\*\TileInfo = "prop:Type;Size" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\*\InfoTip = "prop:Type;Write;Size" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\*\InfoTip = "prop:Type;Write;Size" 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\*\TileInfo = "prop:Type;Size" SVCHOST.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\*\QuickTip = "prop:Type;Size" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\*\QuickTip = "prop:Type;Size" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" SVCHOST.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 3952 WINWORD.EXE 3952 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
SPOOLSV.EXESVCHOST.EXESVCHOST.EXE0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exepid process 5660 SPOOLSV.EXE 5660 SPOOLSV.EXE 4932 SVCHOST.EXE 4932 SVCHOST.EXE 5660 SPOOLSV.EXE 5660 SPOOLSV.EXE 4932 SVCHOST.EXE 4932 SVCHOST.EXE 5660 SPOOLSV.EXE 5660 SPOOLSV.EXE 4932 SVCHOST.EXE 4932 SVCHOST.EXE 5660 SPOOLSV.EXE 5660 SPOOLSV.EXE 4932 SVCHOST.EXE 4932 SVCHOST.EXE 5660 SPOOLSV.EXE 5660 SPOOLSV.EXE 4932 SVCHOST.EXE 4932 SVCHOST.EXE 5660 SPOOLSV.EXE 5660 SPOOLSV.EXE 4932 SVCHOST.EXE 4932 SVCHOST.EXE 1860 SVCHOST.EXE 1860 SVCHOST.EXE 1860 SVCHOST.EXE 1860 SVCHOST.EXE 1860 SVCHOST.EXE 1860 SVCHOST.EXE 1860 SVCHOST.EXE 1860 SVCHOST.EXE 1860 SVCHOST.EXE 1860 SVCHOST.EXE 1860 SVCHOST.EXE 1860 SVCHOST.EXE 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe 5660 SPOOLSV.EXE 4932 SVCHOST.EXE 5660 SPOOLSV.EXE 4932 SVCHOST.EXE 5660 SPOOLSV.EXE 5660 SPOOLSV.EXE 4932 SVCHOST.EXE 4932 SVCHOST.EXE 5660 SPOOLSV.EXE 5660 SPOOLSV.EXE 4932 SVCHOST.EXE 4932 SVCHOST.EXE 5660 SPOOLSV.EXE 5660 SPOOLSV.EXE 4932 SVCHOST.EXE 4932 SVCHOST.EXE -
Suspicious use of SetWindowsHookEx 20 IoCs
Processes:
0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exeSVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESPOOLSV.EXESVCHOST.EXESVCHOST.EXESPOOLSV.EXESPOOLSV.EXESVCHOST.EXESPOOLSV.EXEWINWORD.EXEpid process 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe 1860 SVCHOST.EXE 1988 SVCHOST.EXE 4932 SVCHOST.EXE 2724 SVCHOST.EXE 5612 SVCHOST.EXE 5660 SPOOLSV.EXE 1764 SVCHOST.EXE 4940 SVCHOST.EXE 5384 SPOOLSV.EXE 3428 SPOOLSV.EXE 3488 SVCHOST.EXE 2412 SPOOLSV.EXE 3952 WINWORD.EXE 3952 WINWORD.EXE 3952 WINWORD.EXE 3952 WINWORD.EXE 3952 WINWORD.EXE 3952 WINWORD.EXE 3952 WINWORD.EXE -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exeSVCHOST.EXESVCHOST.EXESPOOLSV.EXEdescription pid process target process PID 4640 wrote to memory of 1860 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe SVCHOST.EXE PID 4640 wrote to memory of 1860 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe SVCHOST.EXE PID 4640 wrote to memory of 1860 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe SVCHOST.EXE PID 1860 wrote to memory of 1988 1860 SVCHOST.EXE SVCHOST.EXE PID 1860 wrote to memory of 1988 1860 SVCHOST.EXE SVCHOST.EXE PID 1860 wrote to memory of 1988 1860 SVCHOST.EXE SVCHOST.EXE PID 1860 wrote to memory of 4932 1860 SVCHOST.EXE SVCHOST.EXE PID 1860 wrote to memory of 4932 1860 SVCHOST.EXE SVCHOST.EXE PID 1860 wrote to memory of 4932 1860 SVCHOST.EXE SVCHOST.EXE PID 4932 wrote to memory of 2724 4932 SVCHOST.EXE SVCHOST.EXE PID 4932 wrote to memory of 2724 4932 SVCHOST.EXE SVCHOST.EXE PID 4932 wrote to memory of 2724 4932 SVCHOST.EXE SVCHOST.EXE PID 4932 wrote to memory of 5612 4932 SVCHOST.EXE SVCHOST.EXE PID 4932 wrote to memory of 5612 4932 SVCHOST.EXE SVCHOST.EXE PID 4932 wrote to memory of 5612 4932 SVCHOST.EXE SVCHOST.EXE PID 4932 wrote to memory of 5660 4932 SVCHOST.EXE SPOOLSV.EXE PID 4932 wrote to memory of 5660 4932 SVCHOST.EXE SPOOLSV.EXE PID 4932 wrote to memory of 5660 4932 SVCHOST.EXE SPOOLSV.EXE PID 5660 wrote to memory of 1764 5660 SPOOLSV.EXE SVCHOST.EXE PID 5660 wrote to memory of 1764 5660 SPOOLSV.EXE SVCHOST.EXE PID 5660 wrote to memory of 1764 5660 SPOOLSV.EXE SVCHOST.EXE PID 5660 wrote to memory of 4940 5660 SPOOLSV.EXE SVCHOST.EXE PID 5660 wrote to memory of 4940 5660 SPOOLSV.EXE SVCHOST.EXE PID 5660 wrote to memory of 4940 5660 SPOOLSV.EXE SVCHOST.EXE PID 5660 wrote to memory of 5384 5660 SPOOLSV.EXE SPOOLSV.EXE PID 5660 wrote to memory of 5384 5660 SPOOLSV.EXE SPOOLSV.EXE PID 5660 wrote to memory of 5384 5660 SPOOLSV.EXE SPOOLSV.EXE PID 1860 wrote to memory of 3428 1860 SVCHOST.EXE SPOOLSV.EXE PID 1860 wrote to memory of 3428 1860 SVCHOST.EXE SPOOLSV.EXE PID 1860 wrote to memory of 3428 1860 SVCHOST.EXE SPOOLSV.EXE PID 4640 wrote to memory of 3488 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe SVCHOST.EXE PID 4640 wrote to memory of 3488 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe SVCHOST.EXE PID 4640 wrote to memory of 3488 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe SVCHOST.EXE PID 4640 wrote to memory of 2412 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe SPOOLSV.EXE PID 4640 wrote to memory of 2412 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe SPOOLSV.EXE PID 4640 wrote to memory of 2412 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe SPOOLSV.EXE PID 4640 wrote to memory of 3952 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe WINWORD.EXE PID 4640 wrote to memory of 3952 4640 0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe"C:\Users\Admin\AppData\Local\Temp\0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1988 -
F:\recycled\SVCHOST.EXEF:\recycled\SVCHOST.EXE :agent3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2724 -
F:\recycled\SVCHOST.EXEF:\recycled\SVCHOST.EXE :agent4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5612 -
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent4⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5660 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1764 -
F:\recycled\SVCHOST.EXEF:\recycled\SVCHOST.EXE :agent5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4940 -
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5384 -
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3428 -
F:\recycled\SVCHOST.EXEF:\recycled\SVCHOST.EXE :agent2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3488 -
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2412 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0720771916f404e2cd628efabb7e3de832e62a56deec70b3df3a8a2ba71aa6ab.doc" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD5912dc82fe9e1f4db5729a0e832fbbfaa
SHA17257223c42668ece9bde934eb07dc7f33c5ea7f9
SHA2560446d08b8d3acf98e4739d8f20ce737fa30fd010638107e88331bcdad27de6f2
SHA51242b0c94953c2a50825ead1fb6bc44877d15e7a38ded507c0aef83e372694cdebf9233f61123ead3be521c8a05d2ec81dfa77b976b4682f2162492f4cefc28ce1
-
Filesize
97KB
MD5c6ecc727192c7e63c29cf7da3dff4f12
SHA1d06642911952f6ab503d7ab23af4bbbdb5b76eeb
SHA256718a0c80d7f6b9604512715bb428e788e8c9c7dceb437c34c1d0e1b6d3b72dbd
SHA512225a56c1cceb9495a38768daef920e7b9ee167271f0934f175c75d2197e9253451fed495220d609a0e4ad6de3f0f3f362fc0638fb7bdfa3721813e6e454c29d0
-
Filesize
2KB
MD51a1dce35d60d2c70ca8894954fd5d384
SHA158547dd65d506c892290755010d0232da34ee000
SHA2562661c05273f33efa4b7faa6ed8a6f7e69a13ad86077f69ee285ece9cba57e44c
SHA5124abe37613145fabeb44ea4c28ecc827c8a0eb2b003e86ae7aef9be5687711fa7a294f17567ea0a70a6f14ab3cbe7886c83763a7c49278097fd53f0d11fd8154e
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
97KB
MD5c0c7ae2db06123a6e87f95c4e9a782f7
SHA10cf34b0e061b56bb45640b9f47f34bf58edaf5c6
SHA256b9d0356e31bff5967491528b70db0f1046c9355732244b6d740ae576de964efa
SHA512fdebe4fefa27a4379f1799082a9d9300ebbd0a3f45e8727c3b1a94237b3ea5978ce422f88167177ca414ac12ae00d356abbf4876ed052d4549ef72180b85ed59
-
Filesize
97KB
MD592f66e87461c9a162c9533d7f1405fac
SHA1405854fd34015bcbfe636895fc0979f007d63771
SHA256aa43cb921412856b2e9c42b882ea51c5bd1fc7dd3bfc4c380e1408bbcea1f570
SHA51221259b58b1c3ea3b1b67800303308b88ef8849118acf1290b5e10f4e7b82ee1b4ff4741f7081bb2d8215f2da32c3ff640ad535e268bace5c36e0dcd8f1adfd6f
-
Filesize
97KB
MD521549e412d0bf268157f427b0a32f720
SHA12a09b22f7e4fb15b16d83bc97e80bc9773ff1eb0
SHA256fe33c0f1c8eef24500a3ebf995e42175ce2f881cbbbe3f67b011e28c1b4e23cc
SHA5126f52601feed8ae237968e83d7290c991bb913cd45e7fb594a44f9c165d3e97c84d47c6cd041f3e4907936b3e38ec0b768af01467cb39e35671bfffc91d4746ce
-
Filesize
2B
MD52b9d4fa85c8e82132bde46b143040142
SHA1a02431cf7c501a5b368c91e41283419d8fa9fb03
SHA2564658d6abbbaf7748c172ed5a3e003cdb8997648f88724834e41f75e54520e142
SHA512c37f27b442d578e94db6e5d879d026b0b3457f42b99ec56a9cb6fca3161540a32e207b942ef2ddb7be01fa9245ba4d8c859978a0f9a498c1ad8aa46d0890e6be
-
Filesize
97KB
MD573b3ece49973c2bbf21a8c7adf029c90
SHA164ab0a7c5d1f4294810ff07c269c2f94c55cb68a
SHA256ec3d372b97c08b5537ffefb01d56352457603387f0ab27714d27af36ee0ccbc0
SHA512252460e05ecd400d49c97a3d93df9b8cdee011fc7674ca33c72f550119562613074d6034812766ce59674504cdab97fd459e218dea6a27f56af9136362fbe6d0