Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 20:44
Behavioral task
behavioral1
Sample
32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe
Resource
win10v2004-20240709-en
General
-
Target
32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe
-
Size
600KB
-
MD5
e104123267c6e51e82e3a80639226e6f
-
SHA1
7cc90fce3cc9907f24aadcb6dbde74ac9e05ecd5
-
SHA256
32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2
-
SHA512
03584f4713d037eba532fa8dd27deaa143d7d9b1afc9ab4a028d4ac7ee27e77e3891e2556bba837c143fc1e868360cc3fa35dfd3f87f36ce4c5720658b5196cb
-
SSDEEP
12288:yPYmIjE7g8bP3nCeNr3CWV7q9zGImAjJdcH4j3ttzFdVCLNSfHoS:yN7g8OC1V7uNRjr4CFTl
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x00090000000234a7-8.dat aspack_v212_v242 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\IME\SHARED\IMEWDBLD.EXE 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\cmdkey.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\credwiz.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\dplaysvr.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\rasdial.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\iscsicli.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\LaunchWinApp.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\powercfg.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\tttracer.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\cmstp.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\Fondue.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\mavinject.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\nslookup.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\RdpSaUacHelper.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\RMActivate.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\SndVol.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\chkdsk.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\cmmon32.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\dcomcnfg.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\dfrgui.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\grpconv.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\TpmInit.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\AtBroker.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\ComputerDefaults.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\ieUnatt.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\tasklist.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\Utilman.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\fontview.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\tar.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\TpmTool.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\InstallShield\_isdel.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\rasautou.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\diskperf.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\gpupdate.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\PATHPING.EXE 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\recover.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\Windows.WARP.JITService.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\xcopy.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\gpscript.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\rdrleakdiag.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\sdiagnhost.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\SearchFilterHost.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\UserAccountControlSettings.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\rasphone.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\isoburn.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\lodctr.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\ndadmin.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\PickerHost.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\PING.EXE 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\UserAccountBroker.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\dccw.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\dllhost.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\EaseOfAccessDialog.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\net.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\regsvr32.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\ttdinject.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\at.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\DevicePairingWizard.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\getmac.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\odbcconf.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\TsWpfWrp.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\wbem\WinMgmt.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SysWOW64\TRACERT.EXE 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe$ 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedge_proxy.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files\Microsoft Office\root\Office16\Wordconv.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoev.exe$ 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SELFCERT.EXE 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOICONS.EXE 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-006E-0409-1000-0000000FF1CE}\misc.exe$ 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedge.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\msedge_proxy.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe$ 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\pubs.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0409-1000-0000000FF1CE}\misc.exe$ 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe$ 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\CLVIEW.EXE 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files\Microsoft Office\root\Office16\XLICONS.EXE 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBridge\SkypeBridge.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files (x86)\Google\Update\Install\{7FE75A3C-1671-4F2D-BB09-D1F7E053C0C9}\chrome_installer.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files\Java\jdk-1.8\bin\klist.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files\Java\jdk-1.8\bin\xjc.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files\Java\jre-1.8\bin\javaw.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\VPREVIEW.EXE$ 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files\Java\jdk-1.8\bin\javap.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Source Engine\OSE.EXE 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection64.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\pubs.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe$ 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoia.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Photos.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files\Microsoft Office 15\ClientX64\OfficeClickToRun.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.106\notification_helper.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe$ 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\7-Zip\7z.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files\Microsoft Office\root\Office16\SELFCERT.EXE 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\osmclienticon.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files\Mozilla Firefox\private_browsing.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.Loader.exe$ 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSQRY32.EXE$ 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\msouc.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\assembly\GAC_32\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\assembly\GAC_MSIL\PresentationFontCache\3.0.0.0__31bf3856ad364e35\PresentationFontCache.exe$ 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\MSBuild\v4.0_4.0.0.0__b03f5f7f11d50a3a\MSBuild.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMSvcHost\v4.0_4.0.0.0__b03f5f7f11d50a3a\SMSvcHost.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.CallingShellApp_cw5n1h2txyewy\CallingShellApp.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\dfsvc\v4.0_4.0.0.0__b03f5f7f11d50a3a\dfsvc.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\WsatConfig.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.0\WPF\XamlViewer\XamlViewer_v0300.exe$ 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Windows\assembly\GAC_32\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\ImmersiveControlPanel\SystemSettings.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\AcroRd32Info.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\dfsvc\v4.0_4.0.0.0__b03f5f7f11d50a3a\dfsvc.exe$ 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\_4bitmapibroker.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\dfsvc.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\aspnet_compiler.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v3.5\EdmGen.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_wp.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regsql.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.AppRep.ChxApp_cw5n1h2txyewy\CHXSmartScreen.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Workflow.Compiler\v4.0_4.0.0.0__31bf3856ad364e35\Microsoft.Workflow.Compiler.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_state.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Workflow.Compiler\v4.0_4.0.0.0__31bf3856ad364e35\Microsoft.Workflow.Compiler.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v3.5\WFServicesReg.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\aspnet_wp.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\EdmGen.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ServiceModelReg.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\wow_helper.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMConfigInstaller.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\assembly\GAC_MSIL\dfsvc\2.0.0.0__b03f5f7f11d50a3a\dfsvc.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v3.0\WPF\XamlViewer\XamlViewer_v0300.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.CapturePicker_cw5n1h2txyewy\CapturePicker.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\PinningConfirmationDialog.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.5\AddInProcess32.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\eula.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\ServiceModelReg.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMConfigInstaller.exe$ 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMSvcHost.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\assembly\GAC_64\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File created C:\Windows\assembly\GAC_MSIL\PresentationFontCache\3.0.0.0__31bf3856ad364e35\PresentationFontCache.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.0\WPF\XamlViewer\XamlViewer_v0300.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\assembly\GAC_MSIL\ComSvcConfig\3.0.0.0__b03f5f7f11d50a3a\ComSvcConfig.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\AppLaunch.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v3.5\AddInProcess32.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Workflow.Compiler\v4.0_4.0.0.0__31bf3856ad364e35\Microsoft.Workflow.Compiler.exe$ 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ilasm.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SystemApps\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\XBox.TCUI.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\assembly\GAC_MSIL\dfsvc\2.0.0.0__b03f5f7f11d50a3a\dfsvc.exe$ 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.OOBENetworkCaptivePortal_cw5n1h2txyewy\OOBENetworkCaptivePortal.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\ServiceModelReg.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3636 32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe"C:\Users\Admin\AppData\Local\Temp\32a23c3c9e4b4e5abf1d78e4939c7b9f7c7956cc382e18381284f2558e023ea2.exe"1⤵
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:3636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5f99cb326b65326598ecb8b1c713b27d0
SHA189759ef211e70098ffbbd03f489486348e7ebcaf
SHA25619f212795bedd8562ad0886f68bb5606faadcdb90dce56290f49812f083419ea
SHA5125f3efbcd0cd72dd65ee77a108012e110b8f292e9ab10c4e53f1e9f409c512642957ac6f17f6614309a42c2b32e5adfc96186c64d985ef14552de4ab28adafcf3