Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 13:41
Behavioral task
behavioral1
Sample
c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe
Resource
win10v2004-20240802-en
General
-
Target
c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe
-
Size
598KB
-
MD5
3f341c8398cc94cca3d64b0e867ba893
-
SHA1
12e5ac3ebbe069b524c718e566dfd3c6b5a60418
-
SHA256
c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef
-
SHA512
257ac597212c6959e76e5f04a927097c2416b65abb593b1fa0ffb6ade2e0967bda94065631836fc896cc552b5ebcb680fbfe54947e5136aadeef063b462d0892
-
SSDEEP
12288:jaQgKTzbEy1z5q8gbcImt0LDviQ6VSwM+4:DTzbt1k8Stz6VNM+4
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x0007000000016c75-8.dat aspack_v212_v242 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\IME\IMEJP10\IMJPDADM.EXE c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\dcomcnfg.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\pcaui.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\secinit.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\convert.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\dllhst3g.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\ndadmin.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\net.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\IME\IMEJP10\IMJPDCT.EXE c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\chkntfs.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\cliconfg.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\ComputerDefaults.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\taskkill.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\wuapp.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\icacls.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\OptionalFeatures.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\wermgr.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\com\MigRegDB.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\MuiUnattend.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\odbcad32.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\mfpmp.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\RMActivate_isv.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\tasklist.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\AdapterTroubleshooter.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\certreq.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\chkdsk.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\logman.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\cmdl32.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\cscript.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\recover.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\SystemPropertiesPerformance.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\extrac32.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\NAPSTAT.EXE c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\nslookup.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\rrinstaller.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\wbem\WMIC.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\cacls.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\msra.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\UserAccountControlSettings.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\where.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\wininit.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\xcopy.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\driverquery.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\lodctr.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\net1.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\shutdown.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\isoburn.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\powercfg.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\msiexec.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\PresentationHost.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\TapiUnattend.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\SyncHost.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\verifier.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\IME\IMEJP10\IMJPDSVR.EXE c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\IME\IMEJP10\imjpuexc.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\choice.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\dllhost.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\charmap.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\ctfmon.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\dpapimig.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\SysWOW64\logagent.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\Wkconv.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmplayer.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Program Files (x86)\Microsoft Office\Office14\SETLANG.EXE c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Program Files (x86)\Microsoft Office\Office14\VPREVIEW.EXE c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEContentService.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOICONS.EXE$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmlaunch.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{0AC99519-0FE0-4797-A0D6-2C21B93D4350}\chrome_installer.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\airappinstaller.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\7-Zip\7z.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Program Files\Google\Chrome\Application\chrome_proxy.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Program Files\Java\jre7\bin\java.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\SMSvcHost\0b4d4e172e8054cb61d27f5ab9e0e445\SMSvcHost.ni.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.5\DataSvcUtil.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\winsxs\amd64_microsoft-windows-commandlinehelp_31bf3856ad364e35_6.1.7600.16385_none_3020274b22e8a90f\help.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\dfsvc\2c3e7fda8de40e45e7f5e004094dc7c9\dfsvc.ni.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\WsatConfig\96a8bdafba9f9d3e33cd974bfaa67e58\WsatConfig.ni.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\aspnet_wp.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ilasm.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\MSBuild.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\winsxs\amd64_microsoft-windows-blb-cli-main_31bf3856ad364e35_6.1.7600.16385_none_a749cec7a8b6bf08\wbadmin.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\ehome\ehexthost.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\SMConfigInstaller.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\winsxs\amd64_microsoft-windows-b..environment-windows_31bf3856ad364e35_6.1.7601.17514_none_c75e9c99a36a285a\winload.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\winsxs\amd64_microsoft-windows-basic-misc-tools_31bf3856ad364e35_6.1.7600.16385_none_7351a917d91c961e\expand.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\winsxs\amd64_microsoft-windows-findstr_31bf3856ad364e35_6.1.7601.17514_none_855590d1705431c5\findstr.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\ehome\MediaCenterWebLauncher.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\ComSvcConfig.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.5\EdmGen.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\winsxs\amd64_brmfcwia.inf_31bf3856ad364e35_6.1.7600.16385_none_11493a3982b640b7\BrmfRsmg.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMSvcHost.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\winsxs\amd64_microsoft-windows-d..ing-management-core_31bf3856ad364e35_6.1.7601.17514_none_895a2b74415ea575\DismHost.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Workflow.Compiler\v4.0_4.0.0.0__31bf3856ad364e35\Microsoft.Workflow.Compiler.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\winsxs\amd64_microsoft-windows-axinstallservice_31bf3856ad364e35_6.1.7601.17514_none_352b5454878cd498\AxInstUI.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\Microsoft.W71daf281#\df459c0a2762c33e0699703f186b1751\Microsoft.Workflow.Compiler.ni.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\ehome\RegisterMCEApp.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\winsxs\amd64_microsoft-windows-certificaterequesttool_31bf3856ad364e35_6.1.7600.16385_none_c405852b31194b0b\certreq.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\jsc.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\winsxs\amd64_microsoft-windows-e..e-managed-regmceapp_31bf3856ad364e35_6.1.7600.16385_none_b13a0967547ecab4\RegisterMCEApp.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\winsxs\amd64_microsoft-windows-ehome-ehtray_31bf3856ad364e35_6.1.7601.17514_none_88ff132e83a8a275\ehtray.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\WsatConfig\537950d9c71af966e1d8c9deb550f842\WsatConfig.ni.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\ehome\mcspad.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\WsatConfig.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ServiceModelReg.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\winsxs\amd64_microsoft-windows-a..-experience-apphelp_31bf3856ad364e35_6.1.7600.16385_none_ddf6cb6d7a745cbf\pcaui.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\winsxs\amd64_microsoft-windows-d..-japanese-utilities_31bf3856ad364e35_6.1.7601.17514_none_4b57445488ba33fd\IMJPUEX.EXE c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Workflow.Compiler\v4.0_4.0.0.0__31bf3856ad364e35\Microsoft.Workflow.Compiler.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v3.5\AddInUtil.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\winsxs\amd64_microsoft-windows-c..utermanagerlauncher_31bf3856ad364e35_6.1.7600.16385_none_ea0a643b0e032c19\CompMgmtLauncher.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\winsxs\amd64_microsoft-windows-directshow-dvdplay_31bf3856ad364e35_6.1.7600.16385_none_5da314d233bb2676\dvdplay.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\dfsvc\2c3e7fda8de40e45e7f5e004094dc7c9\dfsvc.ni.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\winsxs\amd64_microsoft-windows-alg_31bf3856ad364e35_6.1.7600.16385_none_04de43c774cf8fe3\alg.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\winsxs\amd64_microsoft-windows-f..temcompareutilities_31bf3856ad364e35_6.1.7600.16385_none_5cbb962a4f0d58c1\fc.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Windows\assembly\GAC_MSIL\SMSvcHost\3.0.0.0__b03f5f7f11d50a3a\SMSvcHost.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_wp.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\winsxs\amd64_aspnet_regsql_b03f5f7f11d50a3a_6.1.7600.16385_none_dcb42ec76404494f\aspnet_regsql.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\assembly\GAC_64\mcupdate\6.1.0.0__31bf3856ad364e35\mcupdate.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe$ c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe File created C:\Windows\Microsoft.NET\NETFXRepair.exe c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2420 c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe"C:\Users\Admin\AppData\Local\Temp\c53b754673d79a9d733088eb25e792128393821974bac4339228bbf4791d8bef.exe"1⤵
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:2420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5712b4ea39ef645274061ca729a0b8b33
SHA180cf9c603972a4f966902b19e6325d9b51601a10
SHA256a39b0bf0dea7b5d1bec96f04140f26670f83d6f197d2ff63e9009ccfe8107e2d
SHA5124d9e8e43bb1023001919d598decab857f1da1c11162fd396b53a5642ab408678f7c5f2e65b813a38da2bb0d9ec690db2fc39042db080932f39ed1fc7c6d8159e