Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 07:43
Static task
static1
Behavioral task
behavioral1
Sample
93b669760191fbc8c9f6586895294ca08d658249c152196ccab3910fd3b69f7d.dll
Resource
win7-20240508-en
General
-
Target
93b669760191fbc8c9f6586895294ca08d658249c152196ccab3910fd3b69f7d.dll
-
Size
2.6MB
-
MD5
2ddee15c6188ea3bab37b64529932b12
-
SHA1
92c990dbf9876d1c1a1fbbe6bbca1b963060ddf4
-
SHA256
93b669760191fbc8c9f6586895294ca08d658249c152196ccab3910fd3b69f7d
-
SHA512
5cc7b0e3494a9cf85295365d8ddd51a8a7a450430df5ee0196a2bfe310e86cb5b123d3db4c6f7319cf541bf734ab28306c607b650565eec5506b3a9975fb341f
-
SSDEEP
49152:b7bVt5aEPyKl9kIDn8yTM/2u0fLlSIiEpXhEQTZ1lsc07PluoCdiXCa0mY1eiW:3RPam0ID81/2uIQIV2kziXCa0mhb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 916 E0CB.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 58 IoCs
description ioc Process File created C:\Windows\SysWOW64\msrd3x40.dll E0CB.tmp File opened for modification C:\Windows\SysWOW64\msvcr120.dll E0CB.tmp File opened for modification C:\Windows\SysWOW64\mfc120u.dll E0CB.tmp File opened for modification C:\Windows\SysWOW64\mfc140u.dll E0CB.tmp File created C:\Windows\SysWOW64\msvcrt20.dll E0CB.tmp File created C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_x86_c62e9f8067f98247\I386\PSCRIPT5.DLL E0CB.tmp File created C:\Windows\SysWOW64\ivfsrc.ax E0CB.tmp File created C:\Windows\SysWOW64\ir41_32original.dll E0CB.tmp File created C:\Windows\SysWOW64\msrepl40.dll E0CB.tmp File created C:\Windows\SysWOW64\FXSXP32.dll E0CB.tmp File opened for modification C:\Windows\SysWOW64\atl110.dll E0CB.tmp File created C:\Windows\SysWOW64\iac25_32.ax E0CB.tmp File created C:\Windows\SysWOW64\mswstr10.dll E0CB.tmp File created C:\Windows\SysWOW64\olesvr32.dll E0CB.tmp File created C:\Windows\SysWOW64\InstallShield\_isdel.exe E0CB.tmp File created C:\Windows\SysWOW64\AppVEntSubsystems32.dll E0CB.tmp File created C:\Windows\SysWOW64\gnsdk_fp.dll E0CB.tmp File opened for modification C:\Windows\SysWOW64\mfc110u.dll E0CB.tmp File created C:\Windows\SysWOW64\msorcl32.dll E0CB.tmp File created C:\Windows\SysWOW64\msxbde40.dll E0CB.tmp File created C:\Windows\SysWOW64\sqlunirl.dll E0CB.tmp File opened for modification C:\Windows\SysWOW64\atl100.dll E0CB.tmp File created C:\Windows\SysWOW64\msexch40.dll E0CB.tmp File opened for modification C:\Windows\SysWOW64\PrintConfig.dll E0CB.tmp File created C:\Windows\SysWOW64\crtdll.dll E0CB.tmp File created C:\Windows\SysWOW64\ir32_32original.dll E0CB.tmp File created C:\Windows\SysWOW64\msvbvm60.dll E0CB.tmp File opened for modification C:\Windows\SysWOW64\opencl.dll E0CB.tmp File opened for modification C:\Windows\SysWOW64\vccorlib120.dll E0CB.tmp File created C:\Windows\SysWOW64\d3d8.dll E0CB.tmp File opened for modification C:\Windows\SysWOW64\mfc100.dll E0CB.tmp File created C:\Windows\System32\DriverStore\FileRepository\prnms003.inf_x86_360f6f3a7c4b3433\I386\PrintConfig.dll E0CB.tmp File created C:\Windows\SysWOW64\InstallShield\setup.exe E0CB.tmp File created C:\Windows\SysWOW64\expsrv.dll E0CB.tmp File created C:\Windows\SysWOW64\mfc40.dll E0CB.tmp File created C:\Windows\SysWOW64\mfc40u.dll E0CB.tmp File opened for modification C:\Windows\SysWOW64\msvcr100.dll E0CB.tmp File created C:\Windows\SysWOW64\OneDriveSetup.exe E0CB.tmp File opened for modification C:\Windows\SysWOW64\mfc140.dll E0CB.tmp File opened for modification C:\Windows\SysWOW64\mfc100u.dll E0CB.tmp File created C:\Windows\SysWOW64\d3dim.dll E0CB.tmp File created C:\Windows\SysWOW64\mspbde40.dll E0CB.tmp File created C:\Windows\SysWOW64\hh.exe E0CB.tmp File created C:\Windows\SysWOW64\ir50_32original.dll E0CB.tmp File opened for modification C:\Windows\SysWOW64\mfc120.dll E0CB.tmp File created C:\Windows\SysWOW64\sqlwoa.dll E0CB.tmp File opened for modification C:\Windows\SysWOW64\concrt140.dll E0CB.tmp File opened for modification C:\Windows\SysWOW64\mfc110.dll E0CB.tmp File created C:\Windows\SysWOW64\msjtes40.dll E0CB.tmp File opened for modification C:\Windows\SysWOW64\msvcr110.dll E0CB.tmp File created C:\Windows\SysWOW64\rdvgogl32.dll E0CB.tmp File created C:\Windows\SysWOW64\acwow64.dll E0CB.tmp File created C:\Windows\SysWOW64\msjet40.dll E0CB.tmp File created C:\Windows\SysWOW64\odbcjt32.dll E0CB.tmp File created C:\Windows\SysWOW64\d3dxof.dll E0CB.tmp File opened for modification C:\Windows\SysWOW64\vcomp140.dll E0CB.tmp File created C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_x86_c62e9f8067f98247\I386\PS5UI.DLL E0CB.tmp File created C:\Windows\SysWOW64\olecli32.dll E0CB.tmp -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia\MPP\QuickTime.mpp E0CB.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\ONBttnIE.dll E0CB.tmp File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe E0CB.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\nppdf32.dll E0CB.tmp File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\msvcr120.dll E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\mfc140u.dll E0CB.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ACE.dll E0CB.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\libGLESv2.dll E0CB.tmp File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\125.0.2535.92\EBWebView\x86\EmbeddedBrowserWebView.dll E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\Mso98win32client.dll E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\SystemX86\mfc140u.dll E0CB.tmp File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe E0CB.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ExtendScript.dll E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\mfc140u.dll E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\ONLNTCOMLIB.DLL E0CB.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia\MPP\MCIMPP.mpp E0CB.tmp File opened for modification C:\Program Files\7-Zip\Uninstall.exe E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Web Server Extensions\16\BIN\FPSRVUTL.DLL E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\JitV.dll E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MSOSB.DLL E0CB.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe E0CB.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe E0CB.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe E0CB.tmp File opened for modification C:\Program Files\7-Zip\7z.sfx E0CB.tmp File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.41\msedgeupdate.dll E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\msvcr120.dll E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\ONBttnIELinkedNotes.dll E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\SystemX86\concrt140.dll E0CB.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe E0CB.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AGM.dll E0CB.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia\MPP\WindowsMedia.mpp E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\msmdlocal.dll E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\msmgdsrv.dll E0CB.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\sqlite.dll E0CB.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Accessibility.api E0CB.tmp File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroPDFImpl.dll E0CB.tmp File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EQUATION\concrt140.dll E0CB.tmp File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\10.0\VSTOMessageProvider.dll E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\Mso30win32client.dll E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\msoshext.dll E0CB.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins3d\drvSOFT.x3d E0CB.tmp File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VC\msdia100.dll E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EQUATION\mfc140u.dll E0CB.tmp File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R32.dll E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\Mso20win32client.dll E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\msolui.dll E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MSOHEV.DLL E0CB.tmp File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.41\MicrosoftEdgeUpdateCore.exe E0CB.tmp File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll E0CB.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\nppdf32.dll E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\VVIEWER.DLL E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MSOHTMED.EXE E0CB.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\GROOVEEX.DLL E0CB.tmp File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\10.0\VSTOLoader.dll E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\concrt140.dll E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\xmsrv.dll E0CB.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\OWSSUPP.DLL E0CB.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\adoberfp.dll E0CB.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\BIB.dll E0CB.tmp -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\EScript.api E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\QuickTime.mpp E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\sqlite.dll E0CB.tmp File created C:\Windows\WinSxS\Backup\wow64_microsoft-windows-rasautodial_31bf3856ad364e35_10.0.19041.546_none_f827f008f8832bd5_rasautou.exe_477abe34 E0CB.tmp File created C:\Windows\assembly\GAC_32\System.Data.OracleClient\2.0.0.0__b77a5c561934e089\System.Data.OracleClient.dll E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\F_CENTRAL_msvcr120_x86.194841A2_D0F2_3B96_9F71_05BA91BEA0FA E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\Search.api E0CB.tmp File created C:\Windows\WinSxS\Backup\wow64_microsoft-windows-com-base-qfe-ole32_31bf3856ad364e35_10.0.19041.1202_none_2b327e97dbe87a1a_ole32.dll_e9dcc2e3 E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\nppdf32.dll E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\nppdf32.dll_Apollo E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\Ace.dll_NON_OPT E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\AcroPDF.dll E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\acrotextextractor.exe E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\adobearm.exe.BDCA7721_F290_4124_BBED_7A15FE7694EB E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\AGM.dll E0CB.tmp File created C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\PDXFile_8.ico E0CB.tmp File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.VisualBasic.Activities.Compiler\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.Activities.Compiler.dll E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\drvDX9.x3d E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\MCIMPP.mpp E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\reader_sl.exe E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\WindowsMedia.mpp E0CB.tmp File created C:\Windows\assembly\GAC_32\PresentationCore\3.0.0.0__31bf3856ad364e35\wpfgfx_v0300.dll E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_mfc100u_x86 E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\AcroRd32.exe E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\adoberfp.dll E0CB.tmp File created C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\XFDFFile_8.ico E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_msvcr100_x86 E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\Multimedia.api_NON_OPT E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\ReadOutLoud.api E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\libcef.dll.15EE1C08_ED51_465D_B6F3_FB152B1CC435 E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\AcroForm.api__NON_OPT E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\AcroRd32.dll E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\AdobeCollabSync.exe E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\Flash.mpp E0CB.tmp File created C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\SecStoreFile.ico E0CB.tmp File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll E0CB.tmp File created C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\Accessibility.api_NON_OPT E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\logtransport2.exe E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\rt3d.dll E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\eula.exe E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\SendMail.api E0CB.tmp File created C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\SC_Reader.ico E0CB.tmp File created C:\Windows\WinSxS\Backup\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_6115038ba57fcb33_kerbclientshared.dll_1fa7b356 E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\00006109E70000000100000000F01FEC\16.0.12527\concrt140.dll_x86 E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\acrobroker.exe E0CB.tmp File created C:\Windows\WinSxS\Backup\wow64_microsoft-windows-advapi32_31bf3856ad364e35_10.0.19041.1052_none_6277ca3070041917_advapi32.dll_9512793c E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\F_CENTRAL_vccorlib120_x86.194841A2_D0F2_3B96_9F71_05BA91BEA0FA E0CB.tmp File created C:\Windows\Microsoft.NET\assembly\GAC_32\napcrypt\v4.0_10.0.0.0__31bf3856ad364e35\NAPCRYPT.DLL E0CB.tmp File created C:\Windows\WinSxS\Backup\x86_microsoft.windows.isolationautomation_6595b64144ccf1df_1.0.19041.746_none_c33b9b0d5e48a5d2_sxsoa.dll_cb87188c E0CB.tmp File created C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\FDFFile_8.ico E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_atl100_x86 E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\acrocef.exe.15EE1C08_ED51_465D_B6F3_FB152B1CC435 E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\logsession.dll E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\PPKLite.api E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\AcroPDFImpl.dll E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\adobearmhelper.exe.BDCA7721_F290_4124_BBED_7A15FE7694EB E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\drvSOFT.x3d E0CB.tmp File created C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\PDFFile_8.ico E0CB.tmp File created C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\XDPFile_8.ico E0CB.tmp File created C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data.OracleClient\v4.0_4.0.0.0__b77a5c561934e089\System.Data.OracleClient.dll E0CB.tmp File created C:\Windows\WinSxS\Backup\wow64_microsoft-windows-atl_31bf3856ad364e35_10.0.19041.746_none_936e34e4ece273a7_atl.dll_0c7220db E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\Annots.api E0CB.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\Bib.dll_NON_OPT E0CB.tmp -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4304 rundll32.exe 4304 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 948 wrote to memory of 4304 948 rundll32.exe 90 PID 948 wrote to memory of 4304 948 rundll32.exe 90 PID 948 wrote to memory of 4304 948 rundll32.exe 90 PID 4304 wrote to memory of 916 4304 rundll32.exe 91 PID 4304 wrote to memory of 916 4304 rundll32.exe 91 PID 4304 wrote to memory of 916 4304 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\93b669760191fbc8c9f6586895294ca08d658249c152196ccab3910fd3b69f7d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\93b669760191fbc8c9f6586895294ca08d658249c152196ccab3910fd3b69f7d.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\E0CB.tmpC:\Users\Admin\AppData\Local\Temp\E0CB.tmp3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
PID:916
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4412,i,2113996974559895641,18156918660790954073,262144 --variations-seed-version --mojo-platform-channel-handle=4088 /prefetch:81⤵PID:2932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5f20308d524f0a6010050d3e0590b5964
SHA11ca885985522181063344f2691f5d250162829fd
SHA256bd5e2fbb37cffb8ef2b7b20a90ef1fe2acf855aebd22699c6319f52ad5885fea
SHA51203d9efa53ed8d76ab8cc151b6ed72f57b4685ddfbb5718005960e1ef24209358ec7b6e56a670c0745d210ee8c1727184f4883950ff9664d41bb06f501a9c66a6
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666