Analysis
-
max time kernel
71s -
max time network
68s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 22:56
Static task
static1
General
-
Target
see7.exe
-
Size
574KB
-
MD5
1ccf28645e2d52556487a9710de54d8e
-
SHA1
e83b5b14a3d08d8838e23c08070ebec713f859ef
-
SHA256
513624286483a4e172511b412b82445a06eefc904d54de75da656ec1a6f8ae99
-
SHA512
5a5f4c5fb992bac2119234563a8a7d3418baab3e3519f936f13a598aa9026dbeba571b7981a5a6afa519e18b124d8cf4c6642b30b88a4a091a051e2b41c5f321
-
SSDEEP
12288:ISLCbH4ZEOJVXxLUpCS+zJMEuKr/5iCseJ7HA9oX+q6Eb1Ql2L2I:n4HMui/5FsXxq6Nl2
Malware Config
Extracted
xloader
2.6
eido
revellbb.com
tempranillowine.net
viralstrategies.info
blacktxu.com
flfththirdbank.com
vaoex.com
theselfdirectedinvestor.com
vinadelmar.travel
othersidejimmythemonkey.com
jaguar-landrovercenter-graz.com
supremeosterreich.com
chatsubs.com
free99.design
serviciosmvs.com
bongmecams.xyz
malikwoodson.com
onlinegamebox.club
694624.com
yeezyzapatos.club
istanbul-hairtransplant.com
expectations.info
giveafeast.com
latcsvg.com
thetablelanta.com
digitalcoastdaily.com
talltailsentertainment.com
gastore.store
sextoys411.com
hhty307.com
gjiijsijfsdff.xyz
discord-dnd.com
myazpensioneducation.com
housetraitors.com
halopinkstar.com
thethord.com
brandx.biz
mrgear.xyz
emuk.site
ydbaba.com
wosongla.com
paligeri.com
clipcoffee.net
pathnorthsweeps.com
urlbnarc.com
grimpeople.online
surgetech.digital
uppercase-shop.com
anniebirdsong.info
cherylalopes.com
bravesxx.com
buysalba.com
aoneclubs.com
wank152.com
viv.gifts
n1groupe.com
zhengyp.top
boreable.xyz
pointlomaadvisors.com
thebestineasttexas.com
we-gamble.net
snowycitron.online
octsqd.xyz
226coaching.com
phuclapgarment.com
veterancg.com
Signatures
-
Xloader payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4260-26-0x0000000000400000-0x000000000042B000-memory.dmp xloader behavioral1/memory/4468-31-0x0000000000820000-0x000000000084B000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
see7.exesee7.execolorcpl.exedescription pid Process procid_target PID 2556 set thread context of 4260 2556 see7.exe 104 PID 4260 set thread context of 3436 4260 see7.exe 56 PID 4468 set thread context of 3436 4468 colorcpl.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
colorcpl.execmd.exesee7.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorcpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language see7.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Modifies registry class 56 IoCs
Processes:
Explorer.EXEdescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\Mode = "8" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\Sort = 0000000000000000000000000000000003000000901c6949177e1a10a91c08002b2ecda903000000ffffffff30f125b7ef471a10a5f102608c9eebac0e000000ffffffff30f125b7ef471a10a5f102608c9eebac0a00000001000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202020202 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\0 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\Vid = "{30C2C434-0889-4C8D-985D-A9F71830B0A9}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\GroupView = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202020202020202 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202020202 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\MRUListEx = ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000050000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000ed30bdda43008947a7f8d013a47366226400000078000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\Rev = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\GroupByDirection = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 = 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 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\FFlags = "18874369" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell\TV_FolderType = "{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell\TV_TopViewID = "{BDBE736F-34F5-4829-ABE8-B550E65146C4}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\GroupByKey:PID = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\IconSize = "32" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943} Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\MRUListEx = ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell\TV_TopViewVersion = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943}\LogicalViewMode = "5" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\0\0 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\NodeSlot = "10" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 020000000100000000000000ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\NodeSlot = "9" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3 = 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 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 03000000020000000100000000000000ffffffff Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exesee7.execolorcpl.exepid Process 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 4260 see7.exe 4260 see7.exe 4260 see7.exe 4260 see7.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 4468 colorcpl.exe 4468 colorcpl.exe 468 taskmgr.exe 468 taskmgr.exe 4468 colorcpl.exe 4468 colorcpl.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 4468 colorcpl.exe 4468 colorcpl.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid Process 3436 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
see7.execolorcpl.exepid Process 4260 see7.exe 4260 see7.exe 4260 see7.exe 4468 colorcpl.exe 4468 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
Processes:
see7.exetaskmgr.exesee7.execolorcpl.exeExplorer.EXEdescription pid Process Token: SeDebugPrivilege 2556 see7.exe Token: SeDebugPrivilege 468 taskmgr.exe Token: SeSystemProfilePrivilege 468 taskmgr.exe Token: SeCreateGlobalPrivilege 468 taskmgr.exe Token: SeDebugPrivilege 4260 see7.exe Token: SeDebugPrivilege 4468 colorcpl.exe Token: SeShutdownPrivilege 3436 Explorer.EXE Token: SeCreatePagefilePrivilege 3436 Explorer.EXE Token: SeShutdownPrivilege 3436 Explorer.EXE Token: SeCreatePagefilePrivilege 3436 Explorer.EXE Token: SeShutdownPrivilege 3436 Explorer.EXE Token: SeCreatePagefilePrivilege 3436 Explorer.EXE Token: SeShutdownPrivilege 3436 Explorer.EXE Token: SeCreatePagefilePrivilege 3436 Explorer.EXE Token: SeShutdownPrivilege 3436 Explorer.EXE Token: SeCreatePagefilePrivilege 3436 Explorer.EXE Token: SeShutdownPrivilege 3436 Explorer.EXE Token: SeCreatePagefilePrivilege 3436 Explorer.EXE Token: SeShutdownPrivilege 3436 Explorer.EXE Token: SeCreatePagefilePrivilege 3436 Explorer.EXE Token: SeShutdownPrivilege 3436 Explorer.EXE Token: SeCreatePagefilePrivilege 3436 Explorer.EXE Token: SeShutdownPrivilege 3436 Explorer.EXE Token: SeCreatePagefilePrivilege 3436 Explorer.EXE Token: SeShutdownPrivilege 3436 Explorer.EXE Token: SeCreatePagefilePrivilege 3436 Explorer.EXE Token: SeShutdownPrivilege 3436 Explorer.EXE Token: SeCreatePagefilePrivilege 3436 Explorer.EXE Token: SeShutdownPrivilege 3436 Explorer.EXE Token: SeCreatePagefilePrivilege 3436 Explorer.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid Process 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid Process 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe 468 taskmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Explorer.EXEpid Process 3436 Explorer.EXE 3436 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
see7.exeExplorer.EXEcolorcpl.exedescription pid Process procid_target PID 2556 wrote to memory of 4260 2556 see7.exe 104 PID 2556 wrote to memory of 4260 2556 see7.exe 104 PID 2556 wrote to memory of 4260 2556 see7.exe 104 PID 2556 wrote to memory of 4260 2556 see7.exe 104 PID 2556 wrote to memory of 4260 2556 see7.exe 104 PID 2556 wrote to memory of 4260 2556 see7.exe 104 PID 3436 wrote to memory of 4468 3436 Explorer.EXE 105 PID 3436 wrote to memory of 4468 3436 Explorer.EXE 105 PID 3436 wrote to memory of 4468 3436 Explorer.EXE 105 PID 4468 wrote to memory of 3184 4468 colorcpl.exe 106 PID 4468 wrote to memory of 3184 4468 colorcpl.exe 106 PID 4468 wrote to memory of 3184 4468 colorcpl.exe 106
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\see7.exe"C:\Users\Admin\AppData\Local\Temp\see7.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\see7.exe"C:\Users\Admin\AppData\Local\Temp\see7.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /72⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:468
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\see7.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3184
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4724