Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 20:24
Static task
static1
Behavioral task
behavioral1
Sample
35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe
Resource
win10v2004-20240226-en
General
-
Target
35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe
-
Size
91KB
-
MD5
0034f2534cdb6f116d879862a841597a
-
SHA1
20664493043369eab5f6710a081b47be31ff9342
-
SHA256
35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb
-
SHA512
5feb4ace265f7bd43c1552fd4a8f914b0aec84db66e65182b459de94ffcd40b9a888c60e9eda29eacdc61fa49efc17e5277b0a39b26917e020a5add0a6eff870
-
SSDEEP
1536:zAwEmBZ04faWmtN4nic+6GQAwEmBZ04faWmtN4nic+6GU:zGms4Eton0QGms4Eton0U
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe -
Detects executables built or packed with MPress PE compressor 30 IoCs
resource yara_rule behavioral1/memory/1200-0-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x0015000000015c79-8.dat INDICATOR_EXE_Packed_MPress behavioral1/files/0x0007000000015cf2-109.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/668-111-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x0006000000016c76-116.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/668-115-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/576-123-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/576-126-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x0006000000016ccb-127.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2792-136-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x0006000000016cdc-137.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2832-146-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x0006000000016ce4-147.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/1200-149-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x0006000000016cec-158.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2960-160-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1260-180-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1940-216-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1940-226-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/3016-235-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/3064-240-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/3064-244-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2380-250-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2380-253-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1200-270-0x00000000023B0000-0x00000000023DE000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x0006000000016cf8-275.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/840-277-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1636-287-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1200-437-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1200-438-0x00000000023B0000-0x00000000023DE000-memory.dmp INDICATOR_EXE_Packed_MPress -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 13 IoCs
pid Process 668 xk.exe 576 IExplorer.exe 2792 WINLOGON.EXE 2832 CSRSS.EXE 2960 SERVICES.EXE 1260 LSASS.EXE 1940 xk.exe 3016 IExplorer.exe 3064 WINLOGON.EXE 2380 CSRSS.EXE 672 SERVICES.EXE 840 LSASS.EXE 1636 SMSS.EXE -
Loads dropped DLL 22 IoCs
pid Process 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File created F:\desktop.ini 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened for modification C:\desktop.ini 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File created C:\desktop.ini 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened for modification F:\desktop.ini 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened (read-only) \??\X: 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened (read-only) \??\Z: 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened (read-only) \??\G: 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened (read-only) \??\H: 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened (read-only) \??\J: 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened (read-only) \??\K: 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened (read-only) \??\M: 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened (read-only) \??\O: 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened (read-only) \??\U: 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened (read-only) \??\V: 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened (read-only) \??\B: 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened (read-only) \??\I: 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened (read-only) \??\L: 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened (read-only) \??\N: 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened (read-only) \??\P: 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened (read-only) \??\Q: 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened (read-only) \??\S: 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened (read-only) \??\T: 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened (read-only) \??\Y: 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened (read-only) \??\R: 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened (read-only) \??\W: 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File created C:\Windows\SysWOW64\PerfStringBackup.TMP OUTLOOK.EXE File created C:\Windows\system32\perfh009.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfc011.dat OUTLOOK.EXE File created C:\Windows\system32\perfh011.dat OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\shell.exe 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File created C:\Windows\system32\perfc00A.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\Mig2.scr 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File created C:\Windows\system32\perfc009.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfh010.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\IExplorer.exe 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File created C:\Windows\system32\perfh007.dat OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\PerfStringBackup.INI OUTLOOK.EXE File created C:\Windows\system32\perfc007.dat OUTLOOK.EXE File created C:\Windows\system32\perfc010.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\shell.exe 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File created C:\Windows\xk.exe 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe File created C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File opened for modification C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File created C:\Windows\inf\Outlook\0009\outlperf.ini OUTLOOK.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Control Panel\Desktop\ 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" OUTLOOK.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel OUTLOOK.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MenuExt OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" OUTLOOK.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006304D-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063076-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630EF-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063096-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063038-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063038-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063042-0000-0000-C000-000000000046}\ = "UserProperty" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063085-0000-0000-C000-000000000046}\ = "SyncObjectEvents" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CD-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063095-0000-0000-C000-000000000046}\ = "View" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D3-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063097-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F3-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F6-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CD-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672E3-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063005-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063042-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630EB-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006F025-0000-0000-C000-000000000046}\ = "_DRecipientControl" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672E0-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006300E-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F4-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00067355-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672E2-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672EE-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630EF-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006F026-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{50BB9B50-811D-11CE-B565-00AA00608FAA}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063094-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063002-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D3-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672FA-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00067366-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DE-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063025-0000-0000-C000-000000000046}\ = "_NoteItem" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F9-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063044-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063048-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006300F-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063033-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006303F-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006309E-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630ED-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672ED-0000-0000-C000-000000000046}\ = "_OlkBusinessCardControl" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672EF-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063059-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063037-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063102-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00067368-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063003-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E3-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063034-0000-0000-C000-000000000046}\ = "_MailItem" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006305C-0000-0000-C000-000000000046}\ = "_UserDefinedProperty" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630B0-0000-0000-C000-000000000046}\ = "_Reminder" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063062-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DA-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063001-0000-0000-C000-000000000046}\ = "_Application" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063075-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006300E-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CC-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006305B-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672E1-0000-0000-C000-000000000046}\ = "OlkOptionButtonEvents" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063021-0000-0000-C000-000000000046} OUTLOOK.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1912 OUTLOOK.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1912 OUTLOOK.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1912 OUTLOOK.EXE 1912 OUTLOOK.EXE 1912 OUTLOOK.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1912 OUTLOOK.EXE 1912 OUTLOOK.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 668 xk.exe 576 IExplorer.exe 2792 WINLOGON.EXE 2832 CSRSS.EXE 2960 SERVICES.EXE 1260 LSASS.EXE 1940 xk.exe 3016 IExplorer.exe 3064 WINLOGON.EXE 2380 CSRSS.EXE 672 SERVICES.EXE 840 LSASS.EXE 1636 SMSS.EXE 1912 OUTLOOK.EXE -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1200 wrote to memory of 668 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 28 PID 1200 wrote to memory of 668 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 28 PID 1200 wrote to memory of 668 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 28 PID 1200 wrote to memory of 668 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 28 PID 1200 wrote to memory of 576 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 29 PID 1200 wrote to memory of 576 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 29 PID 1200 wrote to memory of 576 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 29 PID 1200 wrote to memory of 576 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 29 PID 1200 wrote to memory of 2792 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 30 PID 1200 wrote to memory of 2792 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 30 PID 1200 wrote to memory of 2792 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 30 PID 1200 wrote to memory of 2792 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 30 PID 1200 wrote to memory of 2832 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 31 PID 1200 wrote to memory of 2832 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 31 PID 1200 wrote to memory of 2832 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 31 PID 1200 wrote to memory of 2832 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 31 PID 1200 wrote to memory of 2960 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 32 PID 1200 wrote to memory of 2960 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 32 PID 1200 wrote to memory of 2960 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 32 PID 1200 wrote to memory of 2960 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 32 PID 1200 wrote to memory of 1260 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 33 PID 1200 wrote to memory of 1260 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 33 PID 1200 wrote to memory of 1260 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 33 PID 1200 wrote to memory of 1260 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 33 PID 1200 wrote to memory of 1940 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 34 PID 1200 wrote to memory of 1940 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 34 PID 1200 wrote to memory of 1940 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 34 PID 1200 wrote to memory of 1940 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 34 PID 1200 wrote to memory of 3016 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 35 PID 1200 wrote to memory of 3016 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 35 PID 1200 wrote to memory of 3016 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 35 PID 1200 wrote to memory of 3016 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 35 PID 1200 wrote to memory of 3064 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 36 PID 1200 wrote to memory of 3064 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 36 PID 1200 wrote to memory of 3064 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 36 PID 1200 wrote to memory of 3064 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 36 PID 1200 wrote to memory of 2380 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 37 PID 1200 wrote to memory of 2380 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 37 PID 1200 wrote to memory of 2380 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 37 PID 1200 wrote to memory of 2380 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 37 PID 1200 wrote to memory of 672 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 38 PID 1200 wrote to memory of 672 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 38 PID 1200 wrote to memory of 672 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 38 PID 1200 wrote to memory of 672 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 38 PID 1200 wrote to memory of 840 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 39 PID 1200 wrote to memory of 840 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 39 PID 1200 wrote to memory of 840 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 39 PID 1200 wrote to memory of 840 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 39 PID 1200 wrote to memory of 1636 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 40 PID 1200 wrote to memory of 1636 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 40 PID 1200 wrote to memory of 1636 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 40 PID 1200 wrote to memory of 1636 1200 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe 40 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe"C:\Users\Admin\AppData\Local\Temp\35a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1200 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:668
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:576
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2792
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2960
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1260
-
-
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1940
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3016
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3064
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2380
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:672
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:840
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1636
-
-
C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1912
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5e4ad23f5c2695a880a2d0397d988f0ef
SHA1f27f986e832955f762c1393778f59b502e6d7c1b
SHA256bcdb3ee94181fa505ad0acd31bf4b780c2b0619c7f3a90222500726f71220fe6
SHA512a29258a75ac811149025906e378e78e0625721bcc5742cf8dfabdadbad3a4e1c139d5114c4c56989cc7797f1c7d00141824baa70ec5e1d43e39214ae8b38cff8
-
Filesize
1KB
MD548dd6cae43ce26b992c35799fcd76898
SHA18e600544df0250da7d634599ce6ee50da11c0355
SHA2567bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a
SHA512c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31
-
Filesize
91KB
MD50034f2534cdb6f116d879862a841597a
SHA120664493043369eab5f6710a081b47be31ff9342
SHA25635a70c1d13fa8d48bcae21652dc6b86b46aad40f5dd0d14d2e336c95477cf0cb
SHA5125feb4ace265f7bd43c1552fd4a8f914b0aec84db66e65182b459de94ffcd40b9a888c60e9eda29eacdc61fa49efc17e5277b0a39b26917e020a5add0a6eff870
-
Filesize
91KB
MD559ff8e852b8f534e917847e93add17a7
SHA177dc5fe1de65ec36aeacdea863a3e4dba85d8f72
SHA2569dbb27c35cc9064f82af7772f48147e07c19e08b505e6b3f99e5a77981602439
SHA5129dc50b18c3cd5fd3b0ed9d88a10d6db9d9c4ff934656946f57523022ff9ec7a5f46bfeb4d9168311ac3c24621e02a13b1e422f6b4684c3dc39f1a36ff545cbb0
-
Filesize
91KB
MD5ad127336a626764daff2038bf0e617aa
SHA1196491e8b7146138567c7f64d3027176d95e679e
SHA256165489e530cf3ae807aabdb9ecd7c337c66641610cc153978ee01e938c025dea
SHA5127daef08dcbc5f5e4e18a1ae07dae1815afe2cb421be7faca1e592419dc25c03ee7ad9c249ce56ce6646d0adb34ef08814ba7df20203395c7c762d20facf118eb
-
Filesize
91KB
MD55f761abb638ebcd6655053de1e18bb2b
SHA12b62e9c49297ed5dfe6d10d41ec439130b2fcffe
SHA256e93066c6131546c6583b9c6ba5d6bb4ea46781c208e17d85619be50430651563
SHA512856239bb4d98e95c3905b661a325cdc18f159e1c4283be551991af8f7385f98269ce0153ca408ba7712893ab0f2dc7075c8fe76cf9ebc719de2a3365536b19f3
-
Filesize
91KB
MD543bf81c5150d239e4c05690a86978d00
SHA1ec775fcaf4e1139b47bd90892683a43b0e455df5
SHA256f2885accebe2c028d703cb8d1a476759aeac68386137797d212e0bec1bdea568
SHA51219e3dd568711218b5051c01aed32de495cc1e3a0649039cab008b5cbf05fdc8ebc8ebf447a623c8611e46716c9c624654e674de3cead7b8fb72f4473c4aaa4f0
-
Filesize
91KB
MD50c37f57d109d8c06a63dc6c6af7127fd
SHA180423e4603439b0f0ed3ab248052eddb2a8f9320
SHA25696cf2a1d06fdfce4a7909e52fb705e05be2d9692c234853b66afd9e9b8c93d0e
SHA51277b63121bdd4e444bd90fe793d2a6636e0e38aad1f24d5ca5b3a19327ceb2eda1f60c0805decbac6cbc246a8c0c59e4d577caa8c82dc3ec23bb1f02641f910ac
-
Filesize
91KB
MD5900fdb70ca2f2aba4a2047f7f9bb4035
SHA1868ea23defaa340b20c13c136339734c89077207
SHA256817f19b539c3dc2582f3774c044f1cba06531e97b89fbfd13dd6a4c6cf20871f
SHA512b9fa1d88acba94f79e4658895c7134f374ec5ba7db62b37b7d06b723a9e5f3081b004cc2e36d084e9fe84e202b629bdba924fc0881a6eb19c7b01e2e0572864b
-
Filesize
91KB
MD50fbf20d3f72afdf73627074b2c93c522
SHA179d89f4fdc0b38f22f77ab4de74cad1ed779234d
SHA2561b31afc4acd6876ecbe05e0d268c908bb899441be22ba83cbe69ac750880bd8e
SHA5120e0a0d4c43766c3b9b600acbe752933f90cbfa36cacfd3bd334a1ff160761eebfe2d7a27ac3b7d3398ac8c1f531d97d720348d4c8f96ebb304256ada42457408