Analysis
-
max time kernel
141s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:06
Behavioral task
behavioral1
Sample
ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe
Resource
win10v2004-20240802-en
General
-
Target
ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe
-
Size
91KB
-
MD5
124dd158fb485bd536ab348c936ae372
-
SHA1
5d1b43ce2d772c0d91a91d68caee58e03434a761
-
SHA256
ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3
-
SHA512
4d23561cbd2f81a572f5f18f51058534acc59c0557da6b3c05f4faa3a0017bc3eb491de654b7b734ec8c0adb8935159e1ba11d7e3f987bd83b1fd79372cb9068
-
SSDEEP
1536:XRsjdLaslqdBXvTUL0Hnouy8VjoRsjdLaslqdBXvTUL0Hnouy8VjK:XOJKqsout9oOJKqsout9K
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 12 IoCs
pid Process 2552 xk.exe 1064 IExplorer.exe 2876 WINLOGON.EXE 940 CSRSS.EXE 2056 SERVICES.EXE 2168 xk.exe 2136 IExplorer.exe 2472 WINLOGON.EXE 1852 CSRSS.EXE 776 SERVICES.EXE 1292 LSASS.EXE 1784 SMSS.EXE -
Loads dropped DLL 20 IoCs
pid Process 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe -
resource yara_rule behavioral1/memory/2260-0-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0005000000018663-8.dat upx behavioral1/files/0x000700000001867e-111.dat upx behavioral1/memory/2552-115-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0005000000018ed5-116.dat upx behavioral1/memory/1064-127-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0005000000018f08-128.dat upx behavioral1/memory/2876-140-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2260-142-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0005000000018f2c-139.dat upx behavioral1/files/0x0005000000018f40-151.dat upx behavioral1/memory/940-153-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2056-159-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2056-179-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x000700000001867e-219.dat upx behavioral1/files/0x0005000000018ed5-222.dat upx behavioral1/memory/2168-225-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0005000000018f08-237.dat upx behavioral1/memory/2136-235-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2472-251-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2260-252-0x0000000000740000-0x000000000076F000-memory.dmp upx behavioral1/files/0x0005000000018f2c-253.dat upx behavioral1/memory/1852-254-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1852-258-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0005000000018f40-259.dat upx behavioral1/files/0x0005000000018f6e-268.dat upx behavioral1/memory/1292-277-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1292-280-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0005000000018f80-281.dat upx behavioral1/memory/1784-291-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2260-441-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2260-442-0x0000000000740000-0x000000000076F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\desktop.ini ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File created C:\desktop.ini ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened for modification F:\desktop.ini ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File created F:\desktop.ini ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened (read-only) \??\Q: ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened (read-only) \??\M: ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened (read-only) \??\H: ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened (read-only) \??\J: ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened (read-only) \??\P: ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened (read-only) \??\T: ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened (read-only) \??\B: ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened (read-only) \??\K: ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened (read-only) \??\L: ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened (read-only) \??\U: ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened (read-only) \??\W: ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened (read-only) \??\Y: ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened (read-only) \??\G: ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened (read-only) \??\I: ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened (read-only) \??\O: ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened (read-only) \??\R: ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened (read-only) \??\S: ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened (read-only) \??\V: ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened (read-only) \??\X: ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened (read-only) \??\Z: ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened (read-only) \??\E: ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File created C:\Windows\SysWOW64\Mig2.scr ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File created C:\Windows\SysWOW64\IExplorer.exe ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File created C:\Windows\system32\perfc007.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfc010.dat OUTLOOK.EXE File created C:\Windows\system32\perfh011.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfc011.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\PerfStringBackup.TMP OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\PerfStringBackup.INI OUTLOOK.EXE File created C:\Windows\system32\perfh007.dat OUTLOOK.EXE File created C:\Windows\system32\perfh010.dat OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\shell.exe ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File created C:\Windows\SysWOW64\shell.exe ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File created C:\Windows\system32\perfc009.dat OUTLOOK.EXE File created C:\Windows\system32\perfh009.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00C.dat OUTLOOK.EXE -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File created C:\Windows\xk.exe ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe File created C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File opened for modification C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File created C:\Windows\inf\Outlook\0009\outlperf.ini OUTLOOK.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LSASS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINLOGON.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVICES.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINLOGON.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSRSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSRSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVICES.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OUTLOOK.EXE -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Control Panel\Desktop\ ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00067356-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063001-0000-0000-C000-000000000046}\ = "_Application" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006304B-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063049-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630C3-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006302A-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006F025-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00067356-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063042-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E8-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063034-0000-0000-C000-000000000046}\ = "_MailItem" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063085-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063079-0000-0000-C000-000000000046}\ = "InspectorsEvents" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006303D-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063009-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CD-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630B1-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630B0-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006305C-0000-0000-C000-000000000046}\ = "_UserDefinedProperty" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006309C-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006309C-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F3-0000-0000-C000-000000000046}\ = "NavigationPaneEvents_12" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063059-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063006-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630C7-0000-0000-C000-000000000046}\ = "_Store" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063047-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630C4-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063074-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006300E-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063081-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672EB-0000-0000-C000-000000000046}\ = "_OlkContactPhoto" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F2-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006304A-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006303F-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006309B-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006309C-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630FE-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063022-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{50BB9B50-811D-11CE-B565-00AA00608FAA}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063021-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063093-0000-0000-C000-000000000046}\ = "_AutoFormatRule" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F3-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063059-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063072-0000-0000-C000-000000000046}\ = "_OutlookBarGroups" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672FA-0000-0000-C000-000000000046}\ = "_OlkDateControl" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063021-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063046-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E6-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CC-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006300C-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006308C-0000-0000-C000-000000000046}\ = "NameSpaceEvents" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F1-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063038-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E1-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063034-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006304E-0000-0000-C000-000000000046}\ = "ApplicationEvents" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063044-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063035-0000-0000-C000-000000000046}\ = "_TaskItem" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063038-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006F026-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672EC-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00067355-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E6-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CE-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 360 OUTLOOK.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 360 OUTLOOK.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 360 OUTLOOK.EXE 360 OUTLOOK.EXE 360 OUTLOOK.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 360 OUTLOOK.EXE 360 OUTLOOK.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 2552 xk.exe 1064 IExplorer.exe 2876 WINLOGON.EXE 940 CSRSS.EXE 2056 SERVICES.EXE 2168 xk.exe 2136 IExplorer.exe 2472 WINLOGON.EXE 1852 CSRSS.EXE 776 SERVICES.EXE 1292 LSASS.EXE 1784 SMSS.EXE 360 OUTLOOK.EXE -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2552 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 29 PID 2260 wrote to memory of 2552 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 29 PID 2260 wrote to memory of 2552 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 29 PID 2260 wrote to memory of 2552 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 29 PID 2260 wrote to memory of 1064 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 30 PID 2260 wrote to memory of 1064 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 30 PID 2260 wrote to memory of 1064 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 30 PID 2260 wrote to memory of 1064 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 30 PID 2260 wrote to memory of 2876 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 31 PID 2260 wrote to memory of 2876 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 31 PID 2260 wrote to memory of 2876 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 31 PID 2260 wrote to memory of 2876 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 31 PID 2260 wrote to memory of 940 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 32 PID 2260 wrote to memory of 940 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 32 PID 2260 wrote to memory of 940 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 32 PID 2260 wrote to memory of 940 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 32 PID 2260 wrote to memory of 2056 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 33 PID 2260 wrote to memory of 2056 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 33 PID 2260 wrote to memory of 2056 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 33 PID 2260 wrote to memory of 2056 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 33 PID 2260 wrote to memory of 2168 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 34 PID 2260 wrote to memory of 2168 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 34 PID 2260 wrote to memory of 2168 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 34 PID 2260 wrote to memory of 2168 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 34 PID 2260 wrote to memory of 2136 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 35 PID 2260 wrote to memory of 2136 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 35 PID 2260 wrote to memory of 2136 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 35 PID 2260 wrote to memory of 2136 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 35 PID 2260 wrote to memory of 2472 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 36 PID 2260 wrote to memory of 2472 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 36 PID 2260 wrote to memory of 2472 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 36 PID 2260 wrote to memory of 2472 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 36 PID 2260 wrote to memory of 1852 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 37 PID 2260 wrote to memory of 1852 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 37 PID 2260 wrote to memory of 1852 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 37 PID 2260 wrote to memory of 1852 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 37 PID 2260 wrote to memory of 776 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 38 PID 2260 wrote to memory of 776 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 38 PID 2260 wrote to memory of 776 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 38 PID 2260 wrote to memory of 776 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 38 PID 2260 wrote to memory of 1292 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 39 PID 2260 wrote to memory of 1292 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 39 PID 2260 wrote to memory of 1292 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 39 PID 2260 wrote to memory of 1292 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 39 PID 2260 wrote to memory of 1784 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 40 PID 2260 wrote to memory of 1784 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 40 PID 2260 wrote to memory of 1784 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 40 PID 2260 wrote to memory of 1784 2260 ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe 40 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe"C:\Users\Admin\AppData\Local\Temp\ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2260 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2552
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1064
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2876
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:940
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2056
-
-
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2168
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2136
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2472
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1852
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:776
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1292
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1784
-
-
C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:360
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD5755b1fd2f65abda4d9d8438fdd276cfd
SHA11933174cf6b845a500a2a468ac56fec66e79515c
SHA2569a6454ef32dbb80b74bdbacdc30ca2bd79051af29653e697da71ea3f293e88c7
SHA512b6542c614f4b49417f58af9bd6353d5fcb261a811de6d571dc3e6ae68268f90bd516df39b1762ae6f7175507d6df2c401db5f8f04deded9938a63a34a5e9fedf
-
Filesize
240KB
MD529093a3e2bf92b5edf97dcb1d9eb643a
SHA196dc7811eb07d6fa245bb96b2a20fc855a167e70
SHA256a59f1f1d046fd6f6bf7874f46e8f9deefbd9f1a97274ad8ac82f77478f645e11
SHA512537af242adf916ff9515644a94f521b9fb8ece31ce7a5a0dc469aba731dabcf25cbc8713be1a29ab3432d2738599c4b0a7f52768ed02ee87b9fb35a43a837975
-
Filesize
240KB
MD560b5ae1a86d8cadb92a81201b337b7d3
SHA121b1371fcdedd9cb894f16575ed269c5e8ed5574
SHA256b39b29b4be4d738ddc0bb6d402166487b2bdb9aea344ea4d98fcbf5da926502a
SHA5122158f70df9568b7d18eb17fcec6ce92ebdc42df3a8a9b39c405def38f151d6fbeab16fcb2d0687e3b190198b9ab8adbd153d1e8a22ecc59b3296c15c95a43e21
-
Filesize
710B
MD593dc1e7e8e4dc4762538a84b135b355d
SHA1bb5653cf46ca6b9dcf6925ed5bd9b7f75dc997b6
SHA256fbaf3df6ac17055ec9d5da6aadd6377d3f1651157107aeb86f5a9d51419b673c
SHA5124516d55e32320c75e448724430afc4d723a5db0edd5279acd013195c59f993f9f0c0306099295bd3f8173d63822aad1de4d89a589e086234e8217ba439c70b5e
-
Filesize
1KB
MD548dd6cae43ce26b992c35799fcd76898
SHA18e600544df0250da7d634599ce6ee50da11c0355
SHA2567bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a
SHA512c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31
-
Filesize
91KB
MD5eacd5b7d8f70bde368a3f1183798f756
SHA1b8dc313c0b34766a8c520e2f098821e733fbb15c
SHA2561c58d9a33f5fdc8c87d8d53258a3596f29b6cae7019548e60d0e9fcb920a28a1
SHA5122e1236a1f362984559cdfb345aeb13a28789f2bbd17d4790c14bdb76527fff39525a41a89c3023ed9d60f66d588ec6edccb46e47886fa37bf9e22dae76781c42
-
Filesize
91KB
MD5124dd158fb485bd536ab348c936ae372
SHA15d1b43ce2d772c0d91a91d68caee58e03434a761
SHA256ebcf85d3606c5c9acd6fb8f8a31338640e429dad236809daa4d138671e2533a3
SHA5124d23561cbd2f81a572f5f18f51058534acc59c0557da6b3c05f4faa3a0017bc3eb491de654b7b734ec8c0adb8935159e1ba11d7e3f987bd83b1fd79372cb9068
-
Filesize
91KB
MD55be297bf5c8e61ad42c0396ed634a43f
SHA14c69758640cdc4c470b6ec230121aa4e46212647
SHA256bde39c0d2ef39336f962a766008734f566ade7b8b40084835b25fd480abb5fd0
SHA5129c0f40581a454cd1beec9ea72863f4252974a99f0d8a9ea1873892aba9ec505e92d2f67a94be1d6f0a1b2978cb2de1cc50f13219820a0bd26bab0bf4ece14f3d
-
Filesize
91KB
MD58fd8d93567f69bdacc9e59ce0b43cf03
SHA106b3b06af8dc30131812460fa1f6d97938d21ff0
SHA256f6d38b6ae6f90482b7a7aefe4d9c2ee275126015aafdb4238cac0e8a515f5296
SHA512f443ae585d8afb060b2636261d4cf5e9c50916fc32a3f98364cd9ad95111c103a344ba556d4261d8c5078898bfbdcda901753a3279a9d0472ec67cdd5b0c11aa
-
Filesize
91KB
MD5de2a437d5f5806b57444d11eb6475dcb
SHA1562366847d439577e59afcf0fbc14630df9229bc
SHA25659155138c3375022bdc082a53e29a3a35a38c70719515eb6c6f9be2553df54f3
SHA512749a92c0e632225f8b7cf29c8aec42cf022f7b84e2d3dd5fa9e7eeb7a0a620730b2301ffb8df15b687cc1fe660028b4cc24f9137b903ff156d222ccf28f320a0
-
Filesize
91KB
MD5c65d33fd211f08190bd080d53bf224c8
SHA13c44dc3586e5d0e42377b88cc06cc39ae007b362
SHA256e7bba73e6cd3d44791f87eec279225d660f05a3732d169f54133228c0dc9d696
SHA512eca4b8251352864d199b8c376ca3413aa8d44d7b919c66c4e0b9ba6c304018d3474306f64b3c556ef6140340f63f2614b30afa78d6fb71a36c9afa143b15c32d
-
Filesize
91KB
MD5c037be0f92b791c5836ae40faad70d6c
SHA1ebccf9da7a9e7704f8d5a4d7f15cfb3984866a5a
SHA256f8ffdd37cd371655141edb62839f2c3c8c18aca8719f0d253052c96c1d09f82b
SHA5127284c54bc8e9cecb4ceeadc35e6fce92e93f17839526c5ce8c7e4241982e334de95d5e059691fad886c7d988b6f358e8d5b7b8bd2b54684e21aaa965ed9f5b83
-
Filesize
91KB
MD508cfa23e57c01c273d6c45212c6ac597
SHA1096b443202ecdd8d4ea6d4921923ec0d7d26f759
SHA256b670bfdea451756928c98977bc77a402a01c5a60f2c13e25bb0bd840bd165dc5
SHA5121c073a7f4b00720aa3930aa6c028a8533c4077ddda4cb928c49aebde63e9385521ad94e96518d8bac96fc7c0b604a5857c4565663228edac997941554a1ae5ae
-
Filesize
91KB
MD5a233011d6bea16bf9f84e2352fce1047
SHA1233631b2dda63b2ae7be288d9f7ed5c5e238c046
SHA25681caf2bd23e29067de6a98ea2602b3661d842bc19ae8a8be0e5f2f9be22812ea
SHA51268c0ca700fb3ca28bbb88b2cb9c325e398fed88fe696b12a608547c795250945c05fa4a3409c0c77314cc31938e9572ce81c92b490be7fb34ed7c62dc936f658
-
Filesize
91KB
MD535e6591b82cb4d34029b962acdcd69f1
SHA1268446b6027d7657c86946b1d118c94ee29c24c8
SHA256b9890ba402fd3f9aee669455820c0517a55a002e20021e0002b5bc3fed8d5c06
SHA512cc639ab085f38d323e7804cd4bf8837bc94a9b2f194cb2fa6f44c49ca97abdf70969068469e2f17d17256a95865090d06d2b728dc3e7000ee73d1e9321bcc424
-
Filesize
91KB
MD5dfa938699b7a3300630be574f4d6ad57
SHA151a36e75d6d523cf1014a6374e0872caaf192c81
SHA256c43d33c96e2f0a6f75ee971b2c8309178a85200a0e8fc9a0a633c53decbfb774
SHA5126601083d0b8dc17a224c744df72ad9b05a72e376e6d0abf08b71669e1175e87b51d35af3b65cd9d74d4ad06c45a2ae6a691728b10285f0377d2cd7196876a6e3
-
Filesize
91KB
MD57626a4979578bc4314e2a86f40e9a212
SHA18e3db8aa87e06d4050e31622510493655e907eb4
SHA25639772215ca3490611122282b4fe3fd369b98ebb618ef95afdf3652bb44446f22
SHA5127a7517688577fe32c8635291663f1e1e178b3647b9de53c359922dc8113d6ea709862b961cc11ebd26bb875ece23eb8fd02cf4a2ed2d0fa3aadd7345f63545a2
-
Filesize
91KB
MD5cfd4501bc7eb35d25c17d4f3620f4761
SHA111974479fd72b70f791830975e58dc1920fe5466
SHA256b1f35dc633ad49412714a84357069a607e13db92bffc919617ae2ab15b132ea9
SHA512135b3fbf057885758d2603a4a18e9a0e73f8e53c7efd10a2686edaab5fbecc3cbcad118c1a866ec686fa9babdfa5964d28ec45c5704e1ba04799febfa20bad60