Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-09-2024 14:28
Behavioral task
behavioral1
Sample
d6d65c7dccab1528b7099712f03e01c0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6d65c7dccab1528b7099712f03e01c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
d6d65c7dccab1528b7099712f03e01c0N.exe
-
Size
260KB
-
MD5
d6d65c7dccab1528b7099712f03e01c0
-
SHA1
336ce972c06791a4cc7ac6b6a71d8ed9aa849584
-
SHA256
740b3fa29a814632eddf1ccc0d15f71685ef6ae0438d196237db7f0bb680183d
-
SHA512
1f3ffd146e36550184a48f257d34288029850f4f835e449b30ccf260648112873c2804ff71b87fbdf84d1d4d0a2757f734b312c75471ae8b6064d1969be8197d
-
SSDEEP
1536:GxtnE6acoso8vzxoSBUES5SwziMYiHzhtAia5QrMsQtCnt8qiJPQsZSTorlN33nn:K/vFYi9yQct1iJPQSrl1LtYFroxTSfM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 25 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation a4c5c.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 8320d.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 35666.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation b9dd4.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation c2c43.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 9ecx1.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 319xa.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation d6d65c7dccab1528b7099712f03e01c0N.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 937b9.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation da7x2.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation b540x.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation d1xc9.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation xeca4.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 0478c.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation ae526.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 8546a.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation c2794.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation b531b.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 722b9.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 33998.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation dd51d.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 94b91.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 5b917.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 7e20b.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation de1cb.exe -
Executes dropped EXE 25 IoCs
pid Process 4664 de1cb.exe 4504 722b9.exe 2520 b9dd4.exe 1748 ae526.exe 1408 dd51d.exe 4340 94b91.exe 1084 a4c5c.exe 1564 c2c43.exe 3536 d1xc9.exe 2024 33998.exe 4952 9ecx1.exe 2364 8546a.exe 2240 5b917.exe 3480 937b9.exe 3216 c2794.exe 4904 7e20b.exe 2348 xeca4.exe 4840 da7x2.exe 4544 b540x.exe 3892 b531b.exe 3608 0478c.exe 4416 319xa.exe 3620 8320d.exe 2792 35666.exe 3952 35666.exe -
resource yara_rule behavioral2/memory/1284-0-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/files/0x0007000000023481-7.dat upx behavioral2/memory/1284-38-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/files/0x0003000000022cc6-72.dat upx behavioral2/memory/4664-74-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/files/0x00050000000226f8-109.dat upx behavioral2/memory/4504-113-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/files/0x0007000000023482-146.dat upx behavioral2/memory/1748-148-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/2520-149-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/files/0x0007000000023483-184.dat upx behavioral2/memory/1748-188-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/1408-225-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/files/0x000e00000002341d-258.dat upx behavioral2/memory/4340-262-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/files/0x0007000000023485-295.dat upx behavioral2/memory/1084-297-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/files/0x0007000000023486-332.dat upx behavioral2/memory/1564-336-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/3536-371-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/files/0x0007000000023488-406.dat upx behavioral2/memory/2024-408-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/4952-445-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/2364-482-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/2240-519-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/files/0x0007000000023490-554.dat upx behavioral2/memory/3480-558-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/3216-595-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/4904-632-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/files/0x0007000000023493-666.dat upx behavioral2/memory/2348-667-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/files/0x000700000002349a-703.dat upx behavioral2/memory/4840-704-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/files/0x0011000000023499-739.dat upx behavioral2/memory/4544-743-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/3892-778-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/files/0x000700000002349c-813.dat upx behavioral2/memory/3608-817-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/files/0x000700000002349d-850.dat upx behavioral2/memory/4416-851-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/3620-888-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/2792-891-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/3952-892-0x0000000000400000-0x0000000000442000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "8320d.exe" 8320d.exe -
Drops file in System32 directory 50 IoCs
description ioc Process File created C:\Windows\SysWOW64\b9dd4.exe 722b9.exe File created C:\Windows\SysWOW64\ae526.exe b9dd4.exe File opened for modification C:\Windows\SysWOW64\dd51d.exe ae526.exe File created C:\Windows\SysWOW64\b531b.exe b540x.exe File opened for modification C:\Windows\SysWOW64\722b9.exe de1cb.exe File opened for modification C:\Windows\SysWOW64\b540x.exe da7x2.exe File created C:\Windows\SysWOW64\d1xc9.exe c2c43.exe File opened for modification C:\Windows\SysWOW64\xeca4.exe 7e20b.exe File opened for modification C:\Windows\SysWOW64\319xa.exe 0478c.exe File opened for modification C:\Windows\SysWOW64\de1cb.exe d6d65c7dccab1528b7099712f03e01c0N.exe File created C:\Windows\SysWOW64\da7x2.exe xeca4.exe File created C:\Windows\SysWOW64\33998.exe d1xc9.exe File opened for modification C:\Windows\SysWOW64\b531b.exe b540x.exe File created C:\Windows\SysWOW64\0478c.exe b531b.exe File opened for modification C:\Windows\SysWOW64\ae526.exe b9dd4.exe File opened for modification C:\Windows\SysWOW64\b9dd4.exe 722b9.exe File created C:\Windows\SysWOW64\722b9.exe de1cb.exe File opened for modification C:\Windows\SysWOW64\35666.exe 35666.exe File created C:\Windows\SysWOW64\c2c43.exe a4c5c.exe File opened for modification C:\Windows\SysWOW64\9ecx1.exe 33998.exe File created C:\Windows\SysWOW64\8320d.exe 319xa.exe File opened for modification C:\Windows\SysWOW64\8320d.exe 319xa.exe File created C:\Windows\SysWOW64\a4c5c.exe 94b91.exe File opened for modification C:\Windows\SysWOW64\94b91.exe dd51d.exe File opened for modification C:\Windows\SysWOW64\7e20b.exe c2794.exe File created C:\Windows\SysWOW64\319xa.exe 0478c.exe File opened for modification C:\Windows\SysWOW64\da7x2.exe xeca4.exe File created C:\Windows\SysWOW64\b540x.exe da7x2.exe File created C:\Windows\SysWOW64\94b91.exe dd51d.exe File opened for modification C:\Windows\SysWOW64\a4c5c.exe 94b91.exe File opened for modification C:\Windows\SysWOW64\c2c43.exe a4c5c.exe File opened for modification C:\Windows\SysWOW64\d1xc9.exe c2c43.exe File created C:\Windows\SysWOW64\7e20b.exe c2794.exe File opened for modification C:\Windows\SysWOW64\5b917.exe 8546a.exe File opened for modification C:\Windows\SysWOW64\33998.exe d1xc9.exe File opened for modification C:\Windows\SysWOW64\8546a.exe 9ecx1.exe File opened for modification C:\Windows\SysWOW64\c2794.exe 937b9.exe File created C:\Windows\SysWOW64\xeca4.exe 7e20b.exe File opened for modification C:\Windows\SysWOW64\0478c.exe b531b.exe File created C:\Windows\SysWOW64\de1cb.exe d6d65c7dccab1528b7099712f03e01c0N.exe File created C:\Windows\SysWOW64\5b917.exe 8546a.exe File opened for modification C:\Windows\SysWOW64\937b9.exe 5b917.exe File opened for modification C:\Windows\SysWOW64\ 8320d.exe File opened for modification C:\Windows\SysWOW64\35666.exe 8320d.exe File created C:\Windows\SysWOW64\8546a.exe 9ecx1.exe File created C:\Windows\SysWOW64\dd51d.exe ae526.exe File created C:\Windows\SysWOW64\937b9.exe 5b917.exe File created C:\Windows\SysWOW64\c2794.exe 937b9.exe File created C:\Windows\SysWOW64\35666.exe 8320d.exe File created C:\Windows\SysWOW64\9ecx1.exe 33998.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd51d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2794.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 319xa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6d65c7dccab1528b7099712f03e01c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 722b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94b91.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 33998.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 937b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0478c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9dd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae526.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4c5c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2c43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e20b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeca4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de1cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7x2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1xc9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ecx1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b917.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b540x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8320d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8546a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b531b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35666.exe -
Modifies registry class 50 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings 722b9.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings 937b9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 7e20b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ c2794.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ da7x2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ b9dd4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ae526.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings 8320d.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings 5b917.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings b531b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ b531b.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings c2c43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ a4c5c.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings d1xc9.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings dd51d.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings xeca4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 319xa.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings 8546a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 722b9.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings c2794.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 0478c.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings b9dd4.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings da7x2.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings 0478c.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings b540x.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings 94b91.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 33998.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 937b9.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings de1cb.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings 9ecx1.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings 7e20b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ de1cb.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings a4c5c.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings 33998.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ xeca4.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings d6d65c7dccab1528b7099712f03e01c0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 9ecx1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 94b91.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ c2c43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ d1xc9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ d6d65c7dccab1528b7099712f03e01c0N.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings ae526.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 8546a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 5b917.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 8320d.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings 35666.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 35666.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ dd51d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ b540x.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings 319xa.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3620 8320d.exe 3620 8320d.exe -
Suspicious use of SetWindowsHookEx 26 IoCs
pid Process 1284 d6d65c7dccab1528b7099712f03e01c0N.exe 4664 de1cb.exe 4504 722b9.exe 2520 b9dd4.exe 1748 ae526.exe 1408 dd51d.exe 4340 94b91.exe 1084 a4c5c.exe 1564 c2c43.exe 3536 d1xc9.exe 2024 33998.exe 4952 9ecx1.exe 2364 8546a.exe 2240 5b917.exe 3480 937b9.exe 3216 c2794.exe 4904 7e20b.exe 2348 xeca4.exe 4840 da7x2.exe 4544 b540x.exe 3892 b531b.exe 3608 0478c.exe 4416 319xa.exe 3620 8320d.exe 2792 35666.exe 3952 35666.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1284 wrote to memory of 4664 1284 d6d65c7dccab1528b7099712f03e01c0N.exe 86 PID 1284 wrote to memory of 4664 1284 d6d65c7dccab1528b7099712f03e01c0N.exe 86 PID 1284 wrote to memory of 4664 1284 d6d65c7dccab1528b7099712f03e01c0N.exe 86 PID 4664 wrote to memory of 4504 4664 de1cb.exe 87 PID 4664 wrote to memory of 4504 4664 de1cb.exe 87 PID 4664 wrote to memory of 4504 4664 de1cb.exe 87 PID 4504 wrote to memory of 2520 4504 722b9.exe 88 PID 4504 wrote to memory of 2520 4504 722b9.exe 88 PID 4504 wrote to memory of 2520 4504 722b9.exe 88 PID 2520 wrote to memory of 1748 2520 b9dd4.exe 89 PID 2520 wrote to memory of 1748 2520 b9dd4.exe 89 PID 2520 wrote to memory of 1748 2520 b9dd4.exe 89 PID 1748 wrote to memory of 1408 1748 ae526.exe 90 PID 1748 wrote to memory of 1408 1748 ae526.exe 90 PID 1748 wrote to memory of 1408 1748 ae526.exe 90 PID 1408 wrote to memory of 4340 1408 dd51d.exe 93 PID 1408 wrote to memory of 4340 1408 dd51d.exe 93 PID 1408 wrote to memory of 4340 1408 dd51d.exe 93 PID 4340 wrote to memory of 1084 4340 94b91.exe 94 PID 4340 wrote to memory of 1084 4340 94b91.exe 94 PID 4340 wrote to memory of 1084 4340 94b91.exe 94 PID 1084 wrote to memory of 1564 1084 a4c5c.exe 97 PID 1084 wrote to memory of 1564 1084 a4c5c.exe 97 PID 1084 wrote to memory of 1564 1084 a4c5c.exe 97 PID 1564 wrote to memory of 3536 1564 c2c43.exe 98 PID 1564 wrote to memory of 3536 1564 c2c43.exe 98 PID 1564 wrote to memory of 3536 1564 c2c43.exe 98 PID 3536 wrote to memory of 2024 3536 d1xc9.exe 99 PID 3536 wrote to memory of 2024 3536 d1xc9.exe 99 PID 3536 wrote to memory of 2024 3536 d1xc9.exe 99 PID 2024 wrote to memory of 4952 2024 33998.exe 101 PID 2024 wrote to memory of 4952 2024 33998.exe 101 PID 2024 wrote to memory of 4952 2024 33998.exe 101 PID 4952 wrote to memory of 2364 4952 9ecx1.exe 102 PID 4952 wrote to memory of 2364 4952 9ecx1.exe 102 PID 4952 wrote to memory of 2364 4952 9ecx1.exe 102 PID 2364 wrote to memory of 2240 2364 8546a.exe 103 PID 2364 wrote to memory of 2240 2364 8546a.exe 103 PID 2364 wrote to memory of 2240 2364 8546a.exe 103 PID 2240 wrote to memory of 3480 2240 5b917.exe 106 PID 2240 wrote to memory of 3480 2240 5b917.exe 106 PID 2240 wrote to memory of 3480 2240 5b917.exe 106 PID 3480 wrote to memory of 3216 3480 937b9.exe 107 PID 3480 wrote to memory of 3216 3480 937b9.exe 107 PID 3480 wrote to memory of 3216 3480 937b9.exe 107 PID 3216 wrote to memory of 4904 3216 c2794.exe 108 PID 3216 wrote to memory of 4904 3216 c2794.exe 108 PID 3216 wrote to memory of 4904 3216 c2794.exe 108 PID 4904 wrote to memory of 2348 4904 7e20b.exe 109 PID 4904 wrote to memory of 2348 4904 7e20b.exe 109 PID 4904 wrote to memory of 2348 4904 7e20b.exe 109 PID 2348 wrote to memory of 4840 2348 xeca4.exe 110 PID 2348 wrote to memory of 4840 2348 xeca4.exe 110 PID 2348 wrote to memory of 4840 2348 xeca4.exe 110 PID 4840 wrote to memory of 4544 4840 da7x2.exe 111 PID 4840 wrote to memory of 4544 4840 da7x2.exe 111 PID 4840 wrote to memory of 4544 4840 da7x2.exe 111 PID 4544 wrote to memory of 3892 4544 b540x.exe 112 PID 4544 wrote to memory of 3892 4544 b540x.exe 112 PID 4544 wrote to memory of 3892 4544 b540x.exe 112 PID 3892 wrote to memory of 3608 3892 b531b.exe 113 PID 3892 wrote to memory of 3608 3892 b531b.exe 113 PID 3892 wrote to memory of 3608 3892 b531b.exe 113 PID 3608 wrote to memory of 4416 3608 0478c.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6d65c7dccab1528b7099712f03e01c0N.exe"C:\Users\Admin\AppData\Local\Temp\d6d65c7dccab1528b7099712f03e01c0N.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\de1cb.exe"C:\Windows\system32\de1cb.exe" killauto~~d6d65c7dccab1528b7099712f03e01c0N.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\722b9.exe"C:\Windows\system32\722b9.exe" killauto~~de1cb.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\b9dd4.exe"C:\Windows\system32\b9dd4.exe" killauto~~722b9.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\ae526.exe"C:\Windows\system32\ae526.exe" killauto~~b9dd4.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\dd51d.exe"C:\Windows\system32\dd51d.exe" killauto~~ae526.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\94b91.exe"C:\Windows\system32\94b91.exe" killauto~~dd51d.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\a4c5c.exe"C:\Windows\system32\a4c5c.exe" killauto~~94b91.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\c2c43.exe"C:\Windows\system32\c2c43.exe" killauto~~a4c5c.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\d1xc9.exe"C:\Windows\system32\d1xc9.exe" killauto~~c2c43.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\33998.exe"C:\Windows\system32\33998.exe" killauto~~d1xc9.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\9ecx1.exe"C:\Windows\system32\9ecx1.exe" killauto~~33998.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\8546a.exe"C:\Windows\system32\8546a.exe" killauto~~9ecx1.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\5b917.exe"C:\Windows\system32\5b917.exe" killauto~~8546a.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\937b9.exe"C:\Windows\system32\937b9.exe" killauto~~5b917.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\c2794.exe"C:\Windows\system32\c2794.exe" killauto~~937b9.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\7e20b.exe"C:\Windows\system32\7e20b.exe" killauto~~c2794.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\xeca4.exe"C:\Windows\system32\xeca4.exe" killauto~~7e20b.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\da7x2.exe"C:\Windows\system32\da7x2.exe" killauto~~xeca4.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\b540x.exe"C:\Windows\system32\b540x.exe" killauto~~da7x2.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\b531b.exe"C:\Windows\system32\b531b.exe" killauto~~b540x.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\0478c.exe"C:\Windows\system32\0478c.exe" killauto~~b531b.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\319xa.exe"C:\Windows\system32\319xa.exe" killauto~~0478c.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4416 -
C:\Windows\SysWOW64\8320d.exe"C:\Windows\system32\8320d.exe" killauto~~319xa.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3620 -
C:\Windows\SysWOW64\35666.exe"C:\Windows\system32\35666.exe" killauto~~8320d.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2792 -
C:\Windows\SysWOW64\35666.exe"C:\Windows\system32\35666.exe"26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3952
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD595d879eaa10ebfcb7dbe81a4e9005ee4
SHA1c2e74591afd7696a6f2a70bc668c0ae711e2f45e
SHA256776921e67e9b24316b24aca1a4e36b4b0421b024e033a9c3f5e7f45a650c9d80
SHA5123f4f2b477aaeb06b474beb38d1b2c4aca77dcdd8be29b6c0d7a54fdad66d0f2f0147d037a3883f376803ccf2995b8a1567ae4b6e9c6e29a0f7a12e49b9088d39
-
Filesize
260KB
MD582a3179b5239cad05c8befa268335c2f
SHA18177899a7ddf7e08ba39d85f5f21e2aedaad4e1d
SHA256c6eae770567f115287242473e63dbd7e7485e8394ffcf4c07de29d667c0da27b
SHA512d6670bd04a9f8aa005eaf21c3189c6150e5ce0b715a81dae414fa315ad99290035a3242f0ea16261d9427faac684b65b4adcb7f34d6e3245165801097374c581
-
Filesize
260KB
MD5593970648e92fd7465ac0ea624ff5316
SHA131633fddd14664a4143c19e68aa08ba13b13be1d
SHA2568ae9d671d5daf179a4fadc20846387234117bc3a1eeeca98f9be6f52d13add9b
SHA51272fcf0b360c50167236246df6167a1d08140477451a494b99ca1f05a1e17a0c174aa2cd490f97662907d1b62b8ad026645467657f5ef18ca7e21fa16a5f01f99
-
Filesize
260KB
MD5acd4386d139ba5a1ab6aeaf6833001a0
SHA1e97bd76f020ec5b9a9aa43cc50f6bea6a4563a2a
SHA25614673dbae301c836d18d7784a70bf6575b2f6492707856e43471cb7a2ca37852
SHA51275d8f4739cb67c89afa801aec1e560589bf7b093bb2ffd3a85b974435e973cf0f0abf733fdded8f54ae9968ab660cba9ea63f3bf61dccef778276aa87bff7eae
-
Filesize
260KB
MD505d6b8b73dfc6f836ef82ad28327d4e0
SHA13752e184e95c417195c0ae30a758aa17ccaafddc
SHA2568e6eb24e0b9f236b974e992ab08ee1e6c421a567945709aca7d7f6b346a34638
SHA512c5a244131073e8336da2a7f945fe2ac71496d553e720f7990d8c03771ca91b3797bc30711bc38e3c500e33c392c2eb458d19c588a31b83670acae1476f721c08
-
Filesize
260KB
MD54109257a85f5cf54caef5f1f264f7cf7
SHA10626b4fc972d2d38e6acbfd6d8ec3cd131064fad
SHA2560b1782946885200d46b77481febfd187fc3213064de8bb35145cfb2b62538044
SHA5124c140d547b947961f1d52baf39b223ed884e03273777708dd55070e1e6cfea77a5d72630414c3c304697722d95dc9ca41a9e093cf99bdb947590b54c7ea64825
-
Filesize
260KB
MD582939a0888b8b75a1b4029fef7dca74d
SHA1503efcfb99eb3fe0d50f3870a7ab13c5e4786d7b
SHA2569dd4ca014217e26ab60e5006eb7140210488f00684dc881394f84391eb512029
SHA51276fd57a89ae961bd861d6cbd47c45f11688d13bec0d9598a702388a6bc0ca6ac45a0ee5f101cba589a4b66a02830a9cc31006bc3b026948ea8ec565b5e8859d8
-
Filesize
260KB
MD56e03f8d125403008aa4f16f3298db9af
SHA11c41850bfea733790149d55daface0beb99865fa
SHA256bef8fa3c6a9a569143a71ea427b0e52db08653adccd890fcb9c939cb53f3d3a8
SHA512c3eebb18c284c4abc4d4936581895d006cd6cfcd97693140869e7d677e2b725a5560956fa2b70142de33295868f962e41c8e64e53eccb104aba0d7e09dc58433
-
Filesize
260KB
MD5f33968f45bdb15731c8b62b30e6a9e1c
SHA1f3188a229415e5de669faee289301294ab4c6104
SHA25609559565e6adae69d2e739300bac3a4ec95cf18fb5fb318ce0464f36bade67af
SHA512f2ff28302138f616e5c5b785d2e46fc20ce7cb82fedae1beabdb11f13a3c7648ea97a0c153af37bbfe7adf20891ce26fcdf10881fb49413b07a2bb5b62f433ee
-
Filesize
260KB
MD59815bf21e7e87616e960796dc39b5c04
SHA186b7f8b2353eeea279a86538742d7e0afa52da94
SHA2560adce21d3494661e2c251186aaa93cd59c75a2e09386dc48a58c6bb59d509600
SHA5129f9bc000b4c3bdd505100ad2e43785d23116ee357969658f48fa18711364651cfd1ba863e717e47a51826ca5766c2fd14a3b797c8d46a55955010e92dad35d89
-
Filesize
260KB
MD5018c2e1b62a4fcf4d2234c2b5d98406e
SHA1e761b0db0454ff4273cd9d11e60b1cb79de6f3dd
SHA2565e7b7e43ba3c0f1935e00c6cef896cb63bd62f2f9c709d07e3706e4ff3c93a2b
SHA5125631a8d7b452f17bd4fa639ac36428390392b009458c4397a000112e3b9ad518cd74dded7cf76d127d9cb06eb31e0e19ce9e7d7a38a2f8a4659cda3f69710085
-
Filesize
260KB
MD5bc173ecb13bbc43136887102794bfcc5
SHA10ce905b4257a5bd5b4547a8889729caec2b2403b
SHA256320bc9a0430701b1c0e024261d89186a9c580f18075d8395332c657e22d302ff
SHA512dbc62376fcfc896df0c9f3cea369f6e0a07c32107cf112377899c44fac753ecd0ec237395c3ed8f956f75720be32f7839b2066366ccc707abfbb6eafe4862ada
-
Filesize
260KB
MD5ac3e65e69deeda08541bcc15ae3cae14
SHA122592d0629145bbbccee1a04024591a1304372ec
SHA256102be2b3f3fd5e72e6c537eb85e8bd959fe668acd2247f6f8e65002b18777de4
SHA512c3e8f7cf094056d13dc9d5fc7eeb1231d8e2e7883aa1f8c099bf0633b76152d94ac69aa3c77cd756c656bd1d40033395232be17e239ab3870b71fdb3336d3c28
-
Filesize
260KB
MD5357c5cc3fe458e47415a8895ae3fc570
SHA1619c2c4f16f5a302a02835ece5fa3cc6e0e8f32a
SHA256f444a08df770d90c6f49064fa8d086163577f1f78440974621f348607916af8f
SHA51270ba76daadfbd37c4caaa6850bf14eec6a1a9781328c9b23f9a3a60354cb4e239c0b9728e6c0a950b1bfd954ad6d7771a1ffa706378a095741fcdefeba5789d4
-
Filesize
260KB
MD5d6d65c7dccab1528b7099712f03e01c0
SHA1336ce972c06791a4cc7ac6b6a71d8ed9aa849584
SHA256740b3fa29a814632eddf1ccc0d15f71685ef6ae0438d196237db7f0bb680183d
SHA5121f3ffd146e36550184a48f257d34288029850f4f835e449b30ccf260648112873c2804ff71b87fbdf84d1d4d0a2757f734b312c75471ae8b6064d1969be8197d