Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3b15bb6f089...fd.exe
windows10-1703-x64
10b349269e93...16.exe
windows10-1703-x64
3b349849a59...23.exe
windows10-1703-x64
b3f7df11dc...8c.exe
windows10-1703-x64
10b3f7f7bbc7...d0.exe
windows10-1703-x64
10b6f8f78085...05.exe
windows10-1703-x64
10b71794921e...51.exe
windows10-1703-x64
10c05c6e2434...8e.exe
windows10-1703-x64
10c8cc203f99...d2.exe
windows10-1703-x64
10c96fd5f1dd...40.exe
windows10-1703-x64
10cf0751df31...7d.exe
windows10-1703-x64
cf3610e817...5f.exe
windows10-1703-x64
5d191674c65...da.exe
windows10-1703-x64
5d559a80052...7c.exe
windows10-1703-x64
10d60229cbc2...b0.exe
windows10-1703-x64
10d78e74e4a3...22.exe
windows10-1703-x64
10d901b86714...43.exe
windows10-1703-x64
da760f61e0...56.exe
windows10-1703-x64
10e0d0a27648...61.exe
windows10-1703-x64
5e4d38d99f9...fc.exe
windows10-1703-x64
e5ad2b2fe9...be.exe
windows10-1703-x64
10e9724fe8d0...4b.exe
windows10-1703-x64
10ea3311758e...ad.exe
windows10-1703-x64
10eaf6bd6c1d...95.exe
windows10-1703-x64
10ebb147e6b3...ee.exe
windows10-1703-x64
ebd0168e06...16.exe
windows10-1703-x64
ecc88023ac...cd.exe
windows10-1703-x64
10f0502f754c...69.exe
windows10-1703-x64
10f164297bfa...de.exe
windows10-1703-x64
10f1ad160996...3b.exe
windows10-1703-x64
f4a5067973...6e.exe
windows10-1703-x64
10f86dd9321d...0e.exe
windows10-1703-x64
10Analysis
-
max time kernel
133s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
13/07/2024, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
b15bb6f0892dc78e8cec312c97b78d00b59e60fd.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
b349269e933263ce9f1927be5742aa8b3d8d5516.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
b349849a596a335a3ce8facff3355881da481d23.exe
Resource
win10-20240611-en
Behavioral task
behavioral4
Sample
b3f7df11dc0220159828667c89adb906df87688c.exe
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
b3f7f7bbc77c46786b1c2be629a30c50c440bfd0.exe
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
b6f8f780853fe7f05ae814728c8ff0e383913805.exe
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
b71794921e0c21d4c4f68746314c37697c191451.exe
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
c05c6e2434d7ff822833cf42308e6d3a2088878e.exe
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
c8cc203f99a4d46c9408b748a1100cebe63052d2.exe
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
c96fd5f1ddc101b767bb2c61dfb0ee8526800140.exe
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
cf0751df3192528fbc671a81d4518a5a9eae817d.exe
Resource
win10-20240611-en
Behavioral task
behavioral12
Sample
cf3610e817c000061c5cb7ebfec7d22454720b5f.exe
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
d191674c6559caaa0797f285a6b96514975c56da.exe
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
d559a80052b000594c0077941d2f1a2879758b7c.exe
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
d60229cbc27661327c07d899e5ed973589b29ab0.exe
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
d78e74e4a3f526cfa82930cd5a832971a36fdd22.exe
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
d901b86714b00ea5e46940b97694f55d4bdee743.exe
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
da760f61e0f5026dbf1d1a610fa67a1d8b34b956.exe
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
e0d0a2764836786c7f0cee2d1fa5b30da73a5f61.exe
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
e4d38d99f93d367abc33edad79d33fe0646c3cfc.exe
Resource
win10-20240404-en
Behavioral task
behavioral21
Sample
e5ad2b2fe9ae9b79559199e35a3d6f2c5e01f9be.exe
Resource
win10-20240404-en
Behavioral task
behavioral22
Sample
e9724fe8d0bf8049646285445277bce9e0b1e14b.exe
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
ea3311758ec34992d91b99f8f52c8e9d92b178ad.exe
Resource
win10-20240611-en
Behavioral task
behavioral24
Sample
eaf6bd6c1d144a187cbba7eac449431cd495d395.exe
Resource
win10-20240404-en
Behavioral task
behavioral25
Sample
ebb147e6b369128c09e4c21dbc68cd13db7a4bee.exe
Resource
win10-20240404-en
Behavioral task
behavioral26
Sample
ebd0168e063780117d41bac9a8eab0803686a116.exe
Resource
win10-20240404-en
Behavioral task
behavioral27
Sample
ecc88023ac2f1e41852ebb47c5841ed66a14f0cd.exe
Resource
win10-20240404-en
Behavioral task
behavioral28
Sample
f0502f754cbee4d0c6100e0f9366cfb87aca0b69.exe
Resource
win10-20240611-en
Behavioral task
behavioral29
Sample
f164297bfae27da0440ccd0cb81fdb48fdcaa0de.exe
Resource
win10-20240404-en
Behavioral task
behavioral30
Sample
f1ad1609968432a7d83efe379ee676628f97ea3b.exe
Resource
win10-20240404-en
Behavioral task
behavioral31
Sample
f4a506797325ba974e553a421fd1974a1426956e.exe
Resource
win10-20240404-en
Behavioral task
behavioral32
Sample
f86dd9321d7d4d5d9b2ff5b3a61871ae407c310e.exe
Resource
win10-20240404-en
General
-
Target
f4a506797325ba974e553a421fd1974a1426956e.exe
-
Size
487KB
-
MD5
398d7c3373971509c04d5b20107530b7
-
SHA1
f4a506797325ba974e553a421fd1974a1426956e
-
SHA256
606b1b5c0f7f6b0b31825ef8d2271727c274fc8c50beada611daa47e35a10792
-
SHA512
7d860486408f05805a30664bccb8f43a6bfc2e27b6cde4c042051ad344b410ec5c02693c5ebc57dde1c6cf500cd4dcc369ed1e7c0c2fe3484b24d99ddfe1f0df
-
SSDEEP
6144:rTj57Z0Lnr0s1pWxD14XLN9JpFAeSeDXrJl3PvgJ6zU5hfQCGw6QpTDj3E8ExGlb:ZPs/WIXLHJp2VYXrJ5PvfUv33E8Aob
Malware Config
Extracted
emotet
Epoch2
186.75.241.230:80
181.143.194.138:443
181.143.53.227:21
85.104.59.244:20
80.11.163.139:443
104.131.44.150:8080
185.187.198.15:80
133.167.80.63:7080
198.199.114.69:8080
192.254.173.31:8080
182.76.6.2:8080
85.106.1.166:50000
59.103.164.174:80
182.176.106.43:995
92.233.128.13:143
149.202.153.252:8080
206.189.98.125:8080
190.108.228.48:990
190.226.44.20:21
85.54.169.141:8080
24.45.195.162:8443
45.33.49.124:443
104.131.11.150:8080
182.176.132.213:8090
95.128.43.213:8080
67.225.229.55:8080
189.209.217.49:80
178.254.6.27:7080
24.45.195.162:7080
62.75.187.192:8080
159.65.25.128:8080
91.205.215.66:8080
152.89.236.214:8080
94.205.247.10:80
200.71.148.138:8080
115.78.95.230:443
190.228.72.244:53
190.106.97.230:443
190.18.146.70:80
47.41.213.2:22
212.71.234.16:8080
80.11.163.139:21
92.222.216.44:8080
136.243.177.26:8080
169.239.182.217:8080
94.192.225.46:80
27.147.163.188:8080
5.196.74.210:8080
199.255.156.210:8080
86.98.25.30:53
190.53.135.159:21
222.214.218.192:8080
211.63.71.72:8080
101.187.237.217:20
178.79.161.166:443
201.251.43.69:8080
190.211.207.11:443
87.230.19.21:8080
138.201.140.110:8080
181.31.213.158:8080
31.12.67.62:7080
41.220.119.246:80
104.236.246.93:8080
78.24.219.147:8080
144.139.247.220:80
201.184.105.242:443
190.145.67.134:8090
217.160.182.191:8080
192.81.213.192:8080
185.94.252.13:443
87.106.139.101:8080
87.106.136.232:8080
46.105.131.87:80
27.4.80.183:443
37.157.194.134:443
124.240.198.66:80
173.212.203.26:8080
31.172.240.91:8080
Signatures
-
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat pixeltran.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 pixeltran.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE pixeltran.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies pixeltran.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 pixeltran.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix pixeltran.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" pixeltran.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" pixeltran.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\open\ddeexec pixeltran.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\print\command\ = "C:\\Windows\\SysWOW64\\PIXELT~1.EXE /dde" pixeltran.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\open\ddeexec\ = "[open(\"%1\")]" f4a506797325ba974e553a421fd1974a1426956e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\printto\ddeexec\ = "[printto(\"%1\",\"%2\",\"%3\",\"%4\")]" f4a506797325ba974e553a421fd1974a1426956e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.RCL f4a506797325ba974e553a421fd1974a1426956e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\open\ddeexec f4a506797325ba974e553a421fd1974a1426956e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\open\command f4a506797325ba974e553a421fd1974a1426956e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.RCL f4a506797325ba974e553a421fd1974a1426956e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\printto\command pixeltran.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\open\command pixeltran.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\print\command pixeltran.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\printto\ddeexec pixeltran.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1 pixeltran.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.RCL\ShellNew\NullFile f4a506797325ba974e553a421fd1974a1426956e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\printto\ddeexec\ = "[printto(\"%1\",\"%2\",\"%3\",\"%4\")]" f4a506797325ba974e553a421fd1974a1426956e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.RCL\ShellNew f4a506797325ba974e553a421fd1974a1426956e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.RCL\ShellNew\NullFile f4a506797325ba974e553a421fd1974a1426956e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\print\ddeexec pixeltran.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\print\ddeexec\ = "[print(\"%1\")]" pixeltran.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\printto\command\ = "C:\\Windows\\SysWOW64\\PIXELT~1.EXE /dde" pixeltran.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\F4A506~1.EXE,0" f4a506797325ba974e553a421fd1974a1426956e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\print\ddeexec\ = "[print(\"%1\")]" f4a506797325ba974e553a421fd1974a1426956e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\ = "Recalc Document" pixeltran.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\printto\command pixeltran.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\printto\ddeexec\ = "[printto(\"%1\",\"%2\",\"%3\",\"%4\")]" pixeltran.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\print\command\ = "C:\\Windows\\SysWOW64\\PIXELT~1.EXE /dde" pixeltran.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.RCL pixeltran.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.RCL\ = "Recalc.Document.1" pixeltran.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\DefaultIcon f4a506797325ba974e553a421fd1974a1426956e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.RCL\ShellNew\NullFile pixeltran.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\printto\command f4a506797325ba974e553a421fd1974a1426956e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\F4A506~1.EXE,0" f4a506797325ba974e553a421fd1974a1426956e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\printto\command f4a506797325ba974e553a421fd1974a1426956e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\DefaultIcon pixeltran.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\open\command pixeltran.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.RCL pixeltran.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\printto\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\F4A506~1.EXE /dde" f4a506797325ba974e553a421fd1974a1426956e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.RCL\ShellNew f4a506797325ba974e553a421fd1974a1426956e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\open\ddeexec\ = "[open(\"%1\")]" f4a506797325ba974e553a421fd1974a1426956e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\printto\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\F4A506~1.EXE /dde" f4a506797325ba974e553a421fd1974a1426956e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1 pixeltran.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\open\ddeexec\ = "[open(\"%1\")]" pixeltran.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\print\command f4a506797325ba974e553a421fd1974a1426956e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\open\ddeexec\ = "[open(\"%1\")]" pixeltran.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\open\command\ = "C:\\Windows\\SysWOW64\\PIXELT~1.EXE /dde" pixeltran.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\printto\ddeexec pixeltran.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1 f4a506797325ba974e553a421fd1974a1426956e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\open\command f4a506797325ba974e553a421fd1974a1426956e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.RCL\ = "Recalc.Document.1" f4a506797325ba974e553a421fd1974a1426956e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\printto\ddeexec\ = "[printto(\"%1\",\"%2\",\"%3\",\"%4\")]" pixeltran.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\open\command\ = "C:\\Windows\\SysWOW64\\PIXELT~1.EXE /dde" pixeltran.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\open\ddeexec f4a506797325ba974e553a421fd1974a1426956e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.RCL\ = "Recalc.Document.1" f4a506797325ba974e553a421fd1974a1426956e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\ = "Recalc Document" f4a506797325ba974e553a421fd1974a1426956e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.RCL\ShellNew pixeltran.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\print\ddeexec pixeltran.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.RCL\ShellNew\NullFile pixeltran.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\print f4a506797325ba974e553a421fd1974a1426956e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\printto\ddeexec f4a506797325ba974e553a421fd1974a1426956e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.RCL\ = "Recalc.Document.1" pixeltran.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\open\ddeexec pixeltran.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.RCL\ShellNew pixeltran.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\DefaultIcon\ = "C:\\Windows\\SysWOW64\\PIXELT~1.EXE,0" pixeltran.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Recalc.Document.1\shell\printto\command\ = "C:\\Windows\\SysWOW64\\PIXELT~1.EXE /dde" pixeltran.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 784 pixeltran.exe 784 pixeltran.exe 784 pixeltran.exe 784 pixeltran.exe 784 pixeltran.exe 784 pixeltran.exe 784 pixeltran.exe 784 pixeltran.exe 784 pixeltran.exe 784 pixeltran.exe 784 pixeltran.exe 784 pixeltran.exe 784 pixeltran.exe 784 pixeltran.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3836 f4a506797325ba974e553a421fd1974a1426956e.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2412 f4a506797325ba974e553a421fd1974a1426956e.exe 2412 f4a506797325ba974e553a421fd1974a1426956e.exe 3836 f4a506797325ba974e553a421fd1974a1426956e.exe 3836 f4a506797325ba974e553a421fd1974a1426956e.exe 3404 pixeltran.exe 3404 pixeltran.exe 784 pixeltran.exe 784 pixeltran.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2412 wrote to memory of 3836 2412 f4a506797325ba974e553a421fd1974a1426956e.exe 73 PID 2412 wrote to memory of 3836 2412 f4a506797325ba974e553a421fd1974a1426956e.exe 73 PID 2412 wrote to memory of 3836 2412 f4a506797325ba974e553a421fd1974a1426956e.exe 73 PID 3404 wrote to memory of 784 3404 pixeltran.exe 75 PID 3404 wrote to memory of 784 3404 pixeltran.exe 75 PID 3404 wrote to memory of 784 3404 pixeltran.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4a506797325ba974e553a421fd1974a1426956e.exe"C:\Users\Admin\AppData\Local\Temp\f4a506797325ba974e553a421fd1974a1426956e.exe"1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\f4a506797325ba974e553a421fd1974a1426956e.exe--e4ba54262⤵
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:3836
-
-
C:\Windows\SysWOW64\pixeltran.exe"C:\Windows\SysWOW64\pixeltran.exe"1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\SysWOW64\pixeltran.exe--7f3311872⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:784
-