Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 02:32
Behavioral task
behavioral1
Sample
d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe
Resource
win10v2004-20240802-en
General
-
Target
d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe
-
Size
91KB
-
MD5
682700d332bf2200df28b6374f61e070
-
SHA1
da89ad07928f42ad417c02fec1babb103cce5a90
-
SHA256
d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce
-
SHA512
adbfd9cdecf78846b93145f3c604e7a208fefaedbaa6be00a308c2a16936d880cd4964a2ee03ab44926f92322e96aba1a7b05030aeed30c6e4140d83816fe782
-
SSDEEP
1536:XJRtlEnBHHIgabuYotV/JbJCX5SBisbJRtlEnBHHIgabuYotV/JbJCX5SBiE:XvtYxOuYotvYQIWvtYxOuYotvYQIE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 14 IoCs
pid Process 668 xk.exe 1124 IExplorer.exe 2928 WINLOGON.EXE 760 CSRSS.EXE 2784 SERVICES.EXE 752 LSASS.EXE 2980 SMSS.EXE 1052 xk.exe 1744 IExplorer.exe 1540 WINLOGON.EXE 2792 CSRSS.EXE 2348 SERVICES.EXE 2316 LSASS.EXE 1176 SMSS.EXE -
Loads dropped DLL 24 IoCs
pid Process 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\desktop.ini d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File created C:\desktop.ini d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File opened for modification F:\desktop.ini d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File created F:\desktop.ini d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File opened (read-only) \??\G: d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File opened (read-only) \??\S: d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File opened (read-only) \??\V: d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File opened (read-only) \??\Z: d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File opened (read-only) \??\I: d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File opened (read-only) \??\N: d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File opened (read-only) \??\O: d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File opened (read-only) \??\Q: d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File opened (read-only) \??\U: d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File opened (read-only) \??\Y: d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File opened (read-only) \??\E: d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File opened (read-only) \??\J: d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File opened (read-only) \??\K: d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File opened (read-only) \??\L: d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File opened (read-only) \??\M: d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File opened (read-only) \??\P: d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File opened (read-only) \??\X: d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File opened (read-only) \??\H: d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File opened (read-only) \??\R: d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File opened (read-only) \??\T: d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File opened (read-only) \??\W: d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File created C:\Windows\system32\perfh00A.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\PerfStringBackup.TMP OUTLOOK.EXE File created C:\Windows\system32\perfh009.dat OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\PerfStringBackup.INI OUTLOOK.EXE File created C:\Windows\system32\perfc009.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfh010.dat OUTLOOK.EXE File created C:\Windows\system32\perfh011.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\shell.exe d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File created C:\Windows\system32\perfc00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfc011.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\IExplorer.exe d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File created C:\Windows\system32\perfh007.dat OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\IExplorer.exe d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File created C:\Windows\system32\perfc007.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfc010.dat OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\shell.exe d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File created C:\Windows\SysWOW64\Mig2.scr d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe -
resource yara_rule behavioral1/memory/1960-0-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0006000000017236-8.dat upx behavioral1/files/0x000700000001754e-110.dat upx behavioral1/memory/668-111-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/668-114-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0005000000018dea-121.dat upx behavioral1/memory/1124-125-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0005000000018e46-126.dat upx behavioral1/memory/1960-132-0x0000000001E10000-0x0000000001E3F000-memory.dmp upx behavioral1/files/0x0005000000018e65-136.dat upx behavioral1/memory/1960-140-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2928-139-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0005000000018e96-151.dat upx behavioral1/memory/760-148-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2784-157-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0005000000018e9f-165.dat upx behavioral1/files/0x0005000000018ea1-174.dat upx behavioral1/memory/752-173-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2784-161-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2980-202-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x000700000001754e-239.dat upx behavioral1/files/0x0005000000018dea-243.dat upx behavioral1/files/0x0005000000018e65-268.dat upx behavioral1/files/0x0005000000018e96-281.dat upx behavioral1/memory/2792-285-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0005000000018e9f-292.dat upx behavioral1/files/0x0005000000018ea1-303.dat upx behavioral1/memory/2316-302-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1176-311-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1540-267-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1744-265-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1540-262-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0005000000018e46-259.dat upx behavioral1/memory/1960-461-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\inf\Outlook\0009\outlperf.ini OUTLOOK.EXE File opened for modification C:\Windows\xk.exe d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File created C:\Windows\xk.exe d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe File created C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File opened for modification C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LSASS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINLOGON.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVICES.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSRSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINLOGON.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LSASS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OUTLOOK.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVICES.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSRSS.EXE -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Control Panel\Desktop\ d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672E2-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672E4-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006303B-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063079-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F5-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E0-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006302B-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00067368-0000-0000-C000-000000000046}\ = "OlkTimeZoneControlEvents" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063044-0000-0000-C000-000000000046}\ = "RecurrencePattern" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063025-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063105-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063079-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630FA-0000-0000-C000-000000000046}\ = "_AddressRuleCondition" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063074-0000-0000-C000-000000000046}\ = "_OutlookBarShortcuts" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063074-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006300D-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630ED-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00067353-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063007-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006302D-0000-0000-C000-000000000046}\ = "_PropertyAccessor" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063040-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CA-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006304D-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630A0-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DB-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00067353-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006303C-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063042-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672E4-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063002-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630C8-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063098-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063037-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063077-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00067366-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672E6-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063045-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063007-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CD-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E2-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F8-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006307C-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063093-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006305A-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063037-0000-0000-C000-000000000046}\ = "_TaskRequestUpdateItem" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672ED-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063077-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063025-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006309B-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630ED-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672E5-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672EC-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D9-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DB-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E4-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630A0-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630FC-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E6-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E8-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D0-0000-0000-C000-000000000046}\ = "_MoveOrCopyRuleAction" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DA-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DC-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006302F-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006300B-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2964 OUTLOOK.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2964 OUTLOOK.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2964 OUTLOOK.EXE 2964 OUTLOOK.EXE 2964 OUTLOOK.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2964 OUTLOOK.EXE 2964 OUTLOOK.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 668 xk.exe 1124 IExplorer.exe 2928 WINLOGON.EXE 760 CSRSS.EXE 2784 SERVICES.EXE 752 LSASS.EXE 2980 SMSS.EXE 1052 xk.exe 1744 IExplorer.exe 1540 WINLOGON.EXE 2792 CSRSS.EXE 2348 SERVICES.EXE 2316 LSASS.EXE 1176 SMSS.EXE 2964 OUTLOOK.EXE -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1960 wrote to memory of 668 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 31 PID 1960 wrote to memory of 668 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 31 PID 1960 wrote to memory of 668 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 31 PID 1960 wrote to memory of 668 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 31 PID 1960 wrote to memory of 1124 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 32 PID 1960 wrote to memory of 1124 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 32 PID 1960 wrote to memory of 1124 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 32 PID 1960 wrote to memory of 1124 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 32 PID 1960 wrote to memory of 2928 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 33 PID 1960 wrote to memory of 2928 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 33 PID 1960 wrote to memory of 2928 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 33 PID 1960 wrote to memory of 2928 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 33 PID 1960 wrote to memory of 760 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 34 PID 1960 wrote to memory of 760 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 34 PID 1960 wrote to memory of 760 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 34 PID 1960 wrote to memory of 760 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 34 PID 1960 wrote to memory of 2784 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 35 PID 1960 wrote to memory of 2784 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 35 PID 1960 wrote to memory of 2784 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 35 PID 1960 wrote to memory of 2784 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 35 PID 1960 wrote to memory of 752 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 36 PID 1960 wrote to memory of 752 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 36 PID 1960 wrote to memory of 752 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 36 PID 1960 wrote to memory of 752 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 36 PID 1960 wrote to memory of 2980 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 37 PID 1960 wrote to memory of 2980 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 37 PID 1960 wrote to memory of 2980 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 37 PID 1960 wrote to memory of 2980 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 37 PID 1960 wrote to memory of 1052 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 38 PID 1960 wrote to memory of 1052 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 38 PID 1960 wrote to memory of 1052 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 38 PID 1960 wrote to memory of 1052 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 38 PID 1960 wrote to memory of 1744 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 39 PID 1960 wrote to memory of 1744 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 39 PID 1960 wrote to memory of 1744 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 39 PID 1960 wrote to memory of 1744 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 39 PID 1960 wrote to memory of 1540 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 40 PID 1960 wrote to memory of 1540 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 40 PID 1960 wrote to memory of 1540 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 40 PID 1960 wrote to memory of 1540 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 40 PID 1960 wrote to memory of 2792 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 41 PID 1960 wrote to memory of 2792 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 41 PID 1960 wrote to memory of 2792 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 41 PID 1960 wrote to memory of 2792 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 41 PID 1960 wrote to memory of 2348 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 42 PID 1960 wrote to memory of 2348 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 42 PID 1960 wrote to memory of 2348 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 42 PID 1960 wrote to memory of 2348 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 42 PID 1960 wrote to memory of 2316 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 43 PID 1960 wrote to memory of 2316 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 43 PID 1960 wrote to memory of 2316 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 43 PID 1960 wrote to memory of 2316 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 43 PID 1960 wrote to memory of 1176 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 44 PID 1960 wrote to memory of 1176 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 44 PID 1960 wrote to memory of 1176 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 44 PID 1960 wrote to memory of 1176 1960 d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe 44 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe"C:\Users\Admin\AppData\Local\Temp\d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1960 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:668
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1124
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2928
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:760
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2784
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:752
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2980
-
-
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1052
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1744
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2792
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2348
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2316
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1176
-
-
C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2964
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5fe46ebf021f6c6ffd07865ea5200aeb4
SHA1476e217291a3a8044d134712e6df11706886793c
SHA2564fbd7c234527fc2a4ed955ec63559ee557440eb2ceec926ab3d69a5ac465fcc3
SHA512803962f09516ca7f6663557e6fb4ff26714b5e0579d2094fd9d6336b05b75b22c60ad1d1c02f940e408a173509510c00451e3332b52d5ec106aa885c56680160
-
Filesize
1KB
MD548dd6cae43ce26b992c35799fcd76898
SHA18e600544df0250da7d634599ce6ee50da11c0355
SHA2567bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a
SHA512c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31
-
Filesize
91KB
MD5450dc9b2e91bf920b41c01fdfc4bf270
SHA1fd454a92c122596fffd1e7882288992a913b68a8
SHA25631ea4badd12a26c6f0ebd9b46bac2e4cde299256bcca589d642f081e10e66d70
SHA51277932acc5a404dcf13158f621d9bc832f7ebf7a7152cd4b40b3ee7b13c0a89bf241bde9ff804884ce589935d28687dffaa76bb516a1edc662f1076eaad5ca5b6
-
Filesize
91KB
MD5682700d332bf2200df28b6374f61e070
SHA1da89ad07928f42ad417c02fec1babb103cce5a90
SHA256d82a88a088d9c3cbb5b41372128941c44844053f04eb9419c86d293aa39964ce
SHA512adbfd9cdecf78846b93145f3c604e7a208fefaedbaa6be00a308c2a16936d880cd4964a2ee03ab44926f92322e96aba1a7b05030aeed30c6e4140d83816fe782
-
Filesize
91KB
MD53bcda66381627f74c024f76f701573f0
SHA102aa30fd3a324c3fbb95df0df7070ed448fc49f3
SHA2569fdaec6c6afbd8e4863658edfdd6eb90df3d8aa12b7d7171658a9f0c68f1dee1
SHA512628cf758d3490e67a411888246b33730ae1c44eb0859b9c045d2fe223be4767e28ff1613871959423b8297821b1a2a881b5e035ecef5a3cb1c14f68e2006a264
-
Filesize
91KB
MD5872afa7206e71fa52582a6e51d11ebe2
SHA1bdd9c852ca253ea136b613da7e183ec63c09c51e
SHA256d279c6f87d5cf162ca4ad4b5bc2322b35acf7c7a64dc2b5afb1e21a798e44b43
SHA512230a46d03a8b3826784a2561ca4c647941a85e9551f33f5e8e221a98c9b2d1546448ff72299214a6be9e20bbc003f22cb02d6a93eb99b3bd774cfe0c6bd71634
-
Filesize
91KB
MD5f31d4ed7afd3cd1ef5e3f522868aa734
SHA1ab99a10bd4b0261ef5f77e68bb5c1394a6ffbc91
SHA256b9f2e121d678d9700268c497db3770c3f7d792ef2b51d569514a7c9fe670b68f
SHA51241aeb78eb5fd586a579d30a13c79ac2f550171ef8a4dc565c63a64bf14c767cdac1fbff8b6be4c0e7ebe0e19a9b3b3f7e2791088c3f9173f26b25338a2eab247
-
Filesize
91KB
MD5452967dbb117500440f51fbdc89bdcf6
SHA11ef3d14184ace37c33cac268719a15b7b6146bcb
SHA25618f574025eab2dfb9e8af15c31ccbb0287a61ac983bd01742378841b72cad0dc
SHA5127b0647432689a6ffcc57774daf68637cec48e4b9ea4b68f39045bc48c05dd9b2ce7414d119fe893ef5a51340410c44ce06f45e7dd5ebca938a8fe64d6777d47d
-
Filesize
91KB
MD5fff5f078bfb2b812cace1b135ecffa75
SHA113ca12c5d353ca18cd6e039d275ebd071fe731e3
SHA256635eb62b130517d878094c816741c4360a4f2c7efd75ccc4b9f8eda1bae9406f
SHA5123941e4594895eab0d8ddc1c55302f2b31377614a5443dc8cb8f3b72d239d206eb4a90b4ec51a52e6d1a4d5722465bb21d34903f653a4f7cdaacbc94acd1e1c84
-
Filesize
91KB
MD50f33c7fb89ac936a9d533b4fbcdfacbc
SHA1af1a61697ebf1ddd387baafc35b9c112809f8086
SHA2565ef308090de8b1fdd84d553abe68a77866201e57805b3e6de4b2988ba82b981d
SHA5123d497c29b21fba1ef7f2e8d50a12cb19834f07221dff1b8bdf19eb1ff422ac4107e430dcfc6cfdc7aba64e91ed212fbd639d9ae7fcb24c2cfc60cc5f1a4ed33f
-
Filesize
91KB
MD5cfdcc0d35fa2cfee9ab6fa444feb71a9
SHA11557264dd2b417439a1e248d6ed020b4ac51cd76
SHA25656ae41d9867b6e34468c5da1052d78c5195e679b185c44b4462c88acb3a80128
SHA512e455f66a03de189796867029c88ec5fe1c81d91c3fb8417a3e9274fdce98c52753d17479a06b65556cd10f17f1d015324823306723b51b631ae8ee3ebb64a33e
-
Filesize
91KB
MD5382c4c913d0a63d2eb057cd7ccc3f0c2
SHA15c8576be7ade900ad2f9569bd8ce775b746c8d5e
SHA2564fc938337fb0355d3e4aeec5731bf67021d4d3394ccd1682630fd9f56c9cd92b
SHA5123a31c250c1f22754342ee82ccceb415a26c3c7fbbb7626d6f1d16d2f08d2c37f01ebab660221c6685f0abcfe249d2993db33f65602933525503fc7e2bd7e62b2
-
Filesize
91KB
MD51fa09fb619051bc9f23bf1f7347bf27d
SHA1a8086fe0d37e07273344fc61cae044bbf4383b69
SHA256f1d327bb805f02c80900f11aef3412e41070043327a6dd234096d8547dd8bed7
SHA512b7927b2890049e0487f88e10730955dda2863a4aff2f4000b08a1f481831c880e90e1f817b85416f78ff3dc0d38696945c284c410977b7b7a486d73bb2ad0cfc
-
Filesize
91KB
MD5182761296bbe0d1552792dbd08e75f09
SHA1abf9cda2150923094515cbfb3dfbc83f2d85e859
SHA256643eb08d47883e7b5f8943751528a5e325f9b5fee9fe252824edab41f3402252
SHA512c016d5978f9c2c3da3ba0c8d71539a04198e6fd7996135bbe8df5fb4399164174f9701fb5b0a807eddd3a4dfe33fbce31f4699fa2614677fe610e6d13301ac12
-
Filesize
91KB
MD5540dd6caeed8b60a11fa149a404d9e6b
SHA14f810dbd7a1fbf1657a60b33594d2e1836533fe6
SHA256ae1bca02561c1f55c76076f05c1503addc121115f96287953995f0d4eedf702b
SHA5124a47897deecf173bf29d7205f7acd41b796e6fa94e338a482ba19f4a51e955bdcfa677a6eda7bf5ef1bf6381b231f4c3a4489bf3d4fd40cc38aafbf6c80fc15a
-
Filesize
91KB
MD5d23bdafb8ae49f234d0048166bff090f
SHA1168c4ce2f99cc7e6da98f6347521ad637bd9714d
SHA256240874f4f0ec8b41705b89ea457e56c8d638fd25639f0b7a1a892670b8a3a7cf
SHA51289598bb1b25aa35f657850689128699b87aa69516359d3ffc1edcc4c74007a2145ecceed8e4f461d74bfd270623fcf669daf4c1257bb793d6733ee53042fe94c
-
Filesize
91KB
MD5393e0d380f8d0c585aa8bda9e8821071
SHA188c26c35f46a11fa5657736a8e32133f8712707b
SHA256dff9437837d4b32fdd24d66f8a3935abd5e5f6942bf638569306d0c963dc5f83
SHA51204f235650f2d482219fcbd9095d5c4fa42b83f86df82b57b9c002222604150a4a9d3648ee9c26fb69ec375ffcdd19c0824743e01d797cdc12379948d8400a73a