Analysis
-
max time kernel
85s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-10-2024 12:37
Behavioral task
behavioral1
Sample
10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe
Resource
win7-20241010-en
General
-
Target
10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe
-
Size
3.8MB
-
MD5
6adf7c0d3e770b9962d9c976abd5d660
-
SHA1
3c595298d93f1bc8c456f06c517097aa98275974
-
SHA256
10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44d
-
SHA512
9a7ce9b89a26643b5e5dd24713228c0280dd8de1fcf88286c4e84940597f98ab74499701492433bbe80cb23c5288fa3540012f971a996a885f27fad8145c2f12
-
SSDEEP
98304:Dg2KK3z9OP+9Rqc7h2BSUXfcrRk0kq4DfT:E2KKjQ+9RZ7lr23r
Malware Config
Extracted
gozi
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral1/memory/2128-184-0x0000000000400000-0x0000000000617000-memory.dmp family_blackmoon behavioral1/memory/2128-764-0x0000000000400000-0x0000000000617000-memory.dmp family_blackmoon -
Gozi family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe -
Xmrig family
-
XMRig Miner payload 14 IoCs
resource yara_rule behavioral1/files/0x000900000001660b-7.dat xmrig behavioral1/memory/2128-184-0x0000000000400000-0x0000000000617000-memory.dmp xmrig behavioral1/memory/2480-186-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2480-276-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2480-344-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2480-346-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2480-370-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2480-373-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2480-375-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2480-397-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2480-399-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2480-510-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2128-764-0x0000000000400000-0x0000000000617000-memory.dmp xmrig behavioral1/memory/2480-765-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZhuDongFangYu.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZhuDongFangYu.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe" 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQPCTray.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe" 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Tray.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe" 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQPCTray.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe" 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Tray.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe" 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe" 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe -
Executes dropped EXE 1 IoCs
pid Process 2480 svchost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe" 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\nslookup.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\svchost.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\WerFaultSecure.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\xwizard.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\diantz.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\eventvwr.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\hdwwiz.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\ieUnatt.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\rasautou.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\SystemPropertiesPerformance.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\System32\DriverStore\FileRepository\bth.inf_amd64_neutral_e54666f6a3e5af91\fsquirt.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\autofmt.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\certutil.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\dllhst3g.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\mstsc.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\charmap.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\dnscacheugc.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\PkgMgr.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\rasdial.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\RmClient.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\wevtutil.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\IME\shared\IMEPADSV.EXE 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\icardagt.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\msinfo32.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\takeown.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\TCPSVCS.EXE 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\SearchFilterHost.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\systeminfo.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\bootcfg.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\control.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\driverquery.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\dvdplay.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\SearchProtocolHost.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\SndVol.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\UserAccountControlSettings.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\winrs.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\findstr.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\logagent.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\mtstocom.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\openfiles.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\more.com 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\userinit.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\mode.com 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\bthudtask.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\diskpart.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\fontview.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\isoburn.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\wusa.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\IME\IMEJP10\IMJPMGR.EXE 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\IME\shared\IMCCPHR.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\migwiz\mighost.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\AdapterTroubleshooter.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\iexpress.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\net.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\net1.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\drvinst.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\com\MigRegDB.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\dpnsvr.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\wimserv.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\wbem\WmiPrvSE.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\auditpol.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\cliconfg.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\taskkill.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\SysWOW64\taskmgr.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe -
resource yara_rule behavioral1/memory/2128-0-0x0000000000400000-0x0000000000617000-memory.dmp upx behavioral1/files/0x0001000000011c9d-13.dat upx behavioral1/memory/2128-184-0x0000000000400000-0x0000000000617000-memory.dmp upx behavioral1/memory/2128-764-0x0000000000400000-0x0000000000617000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\mip.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Program Files (x86)\Internet Explorer\iexplore.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Program Files (x86)\Internet Explorer\ieinstal.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Program Files (x86)\Windows Media Player\setup_wm.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SELFCERT.EXE 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Program Files\Windows Defender\MSASCui.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\LICLUA.EXE 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLICONS.EXE 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\7-Zip\7z.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Setup.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSQRY32.EXE 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\ODeploy.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Program Files (x86)\Windows Media Player\wmlaunch.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Program Files (x86)\Windows Media Player\wmpenc.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\winsxs\amd64_microsoft-windows-write_31bf3856ad364e35_6.1.7600.16385_none_bb77c3d6f6c8e3f6\write.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_netfx-cvtres_for_vc_and_vb_b03f5f7f11d50a3a_6.1.7601.17514_none_726f4033dc35da15\cvtres.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\x86_microsoft-windows-errorreportingfaults_31bf3856ad364e35_6.1.7601.17514_none_720e868d9b0b6a44\WerFaultSecure.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\Installer\{90140000-0011-0000-0000-0000000FF1CE}\oisicon.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_6.1.7601.17514_none_34400a5790d1d336\IMCCPHR.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-tapisetup_31bf3856ad364e35_6.1.7600.16385_none_c5e81c6ab4db0c88\TapiUnattend.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\x86_microsoft-windows-winhstb_31bf3856ad364e35_6.1.7600.16385_none_28dc647c6aba6742\winhlp32.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-systemrestore-main_31bf3856ad364e35_6.1.7601.17514_none_a505d556c9de886a\rstrui.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..-japanese-utilities_31bf3856ad364e35_6.1.7601.17514_none_ef38a8d0d05cc2c7\IMJPDCT.EXE 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\x86_microsoft-windows-m..ommandlineutilities_31bf3856ad364e35_6.1.7600.16385_none_7cf343cac8a829ec\find.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-xwizard-host-process_31bf3856ad364e35_6.1.7600.16385_none_b4e9027a5234f127\xwizard.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\wow64_microsoft-windows-i..llshield-wow64-main_31bf3856ad364e35_6.1.7600.16385_none_ca61f601a4548b8e\_isdel.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\ComSvcConfig\2bd538d545e15452202ef3b41080e2ce\ComSvcConfig.ni.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\SMSvcHost\0b4d4e172e8054cb61d27f5ab9e0e445\SMSvcHost.ni.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\ehome\McxTask.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-waitfor_31bf3856ad364e35_6.1.7600.16385_none_125aa78894e49f8f\waitfor.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-winlogon_31bf3856ad364e35_6.1.7601.17514_none_cde90685eb910636\winlogon.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\Installer\{90140000-0011-0000-0000-0000000FF1CE}\pubs.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-deviceproperties_31bf3856ad364e35_6.1.7600.16385_none_463f54aa539a0b62\DeviceProperties.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-legacyhwui_31bf3856ad364e35_6.1.7600.16385_none_3e69140a61f1eff5\hdwwiz.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_netfx-ldr64_exe_31bf3856ad364e35_6.1.7600.16385_none_f98e4869675ab367\Ldr64.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-b..environment-windows_31bf3856ad364e35_6.1.7601.17514_none_c75e9c99a36a285a_winresume.exe_85cd1215 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p..randprintui-ntprint_31bf3856ad364e35_6.1.7601.17514_none_4e297fab940bc0e5\ntprint.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\x86_microsoft-windows-migrationengine_31bf3856ad364e35_6.1.7601.17514_none_5aaf419e398215df\mighost.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\wow64_microsoft-windows-upnpdevicehost_31bf3856ad364e35_6.1.7600.16385_none_2831d06e8295c671\upnpcont.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\x86_microsoft-windows-s..executionprevention_31bf3856ad364e35_6.1.7600.16385_none_c9b9bfc685ed05d3\SystemPropertiesDataExecutionPrevention.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\WsatConfig\9683999d889dc0b8782c782e2fc1aee5\WsatConfig.ni.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\ehome\WTVConverter.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_brmfcwia.inf_31bf3856ad364e35_6.1.7600.16385_none_11493a3982b640b7\BrmfRsmg.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-packagemanager_31bf3856ad364e35_6.1.7601.17514_none_4afdc98b09e3cfe8\PkgMgr.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-pnphotplugui_31bf3856ad364e35_6.1.7600.16385_none_44d62330646f757a\DeviceEject.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\WPF\Fonts\GlobalUserInterface.CompositeFont 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regtlibv12.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sqm-consolidator-base_31bf3856ad364e35_6.1.7601.17514_none_326571587836a400\wsqmcons.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-synchost_31bf3856ad364e35_6.1.7600.16385_none_c575fec016436d8a\SyncHost.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\wow64_microsoft-windows-tabletpc-inputpanel_31bf3856ad364e35_6.1.7601.17514_none_7a09c587c282995a\TabTip32.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\x86_microsoft-windows-p..ncetoolscommandline_31bf3856ad364e35_6.1.7601.17514_none_632ae4bc5d173763\relog.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\Boot\PCAT\memtest.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-compact_31bf3856ad364e35_6.1.7600.16385_none_55ea2c71cf438ffc\compact.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-f..temcompareutilities_31bf3856ad364e35_6.1.7600.16385_none_5cbb962a4f0d58c1\fc.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-wab-app_31bf3856ad364e35_6.1.7601.17514_none_a0cf62efee3228a3\wab.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\fveupdate.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\Microsoft.NET\Framework\v3.0\WPF\XamlViewer\XamlViewer_v0300.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-audio-volumecontrol_31bf3856ad364e35_6.1.7601.17514_none_244e76d61e1989e5\SndVol.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-diskraid_31bf3856ad364e35_6.1.7601.17514_none_c3afa97fae99bbe4\diskraid.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-virtualdiskservice_31bf3856ad364e35_6.1.7601.17514_none_c910d80f114e267a\vds.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-t..localsessionmanager_31bf3856ad364e35_6.1.7601.17514_none_036ad230212a39ce_lsm.exe_ecbd567a 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\wow64_microsoft-windows-m..onwizardapplication_31bf3856ad364e35_6.1.7601.17514_none_22f5c6aadf559287\MigAutoPlay.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\wow64_microsoft-windows-rasautodial_31bf3856ad364e35_6.1.7600.16385_none_76239aafb364e805\rasautou.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\Backup\x86_microsoft-windows-basic-misc-tools_31bf3856ad364e35_6.1.7600.16385_none_17330d9420bf24e8_expand.exe_f43b24c8 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\x86_ehexthost32_31bf3856ad364e35_6.1.7600.16385_none_2a78e65a954611a5\ehexthost32.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\x86_microsoft-windows-terminalservices-theme_31bf3856ad364e35_6.1.7600.16385_none_d5bc65ffdc22ec35\TSTheme.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-efs-rekeywiz_31bf3856ad364e35_6.1.7600.16385_none_63df9c242588e5fc\rekeywiz.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-t..lipboardredirection_31bf3856ad364e35_6.1.7601.17514_none_5ffc161221c1b4f6\rdpclip.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-w..sition-uicomponents_31bf3856ad364e35_6.1.7601.17514_none_2d1a84c49beb2055\wiaacmgr.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_netfx-csharp_compiler_csc_b03f5f7f11d50a3a_6.1.7600.16385_none_8b52bb03d4ea5d36\csc.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_windowssearchengine_31bf3856ad364e35_7.0.7601.17514_none_d18028273214fa77\SearchIndexer.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_6.1.7600.16385_none_655452efe0fb810b\SvcIni.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_6.1.7601.17514_none_678566b7ddea04a5\poqexec.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-t..es-commandlinetools_31bf3856ad364e35_6.1.7601.17514_none_42d65ed50fa3c682\logoff.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-clip_31bf3856ad364e35_6.1.7600.16385_none_03d0d3c435b27637\clip.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe File created C:\Windows\winsxs\amd64_microsoft-windows-ie-pdm_31bf3856ad364e35_8.0.7600.16385_none_6425238b793ee910\PDMSetup.exe 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2128 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe Token: 33 2128 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe Token: SeIncBasePriorityPrivilege 2128 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe Token: SeIncBasePriorityPrivilege 2480 svchost.exe Token: SeLockMemoryPrivilege 2480 svchost.exe Token: SeLockMemoryPrivilege 2480 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2128 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2480 2128 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe 30 PID 2128 wrote to memory of 2480 2128 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe 30 PID 2128 wrote to memory of 2480 2128 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe 30 PID 2128 wrote to memory of 2480 2128 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe 30 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system 10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe"C:\Users\Admin\AppData\Local\Temp\10e6863438c559243979cfaf3e750d3244dbb7588dff6f12565cc8aa71c9b44dN.exe"1⤵
- UAC bypass
- Event Triggered Execution: Image File Execution Options Injection
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2128 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD51d352dc6402f6bc43f6653279205f0e7
SHA194763f64ff0f2da530e601b8b02f32138803a01b
SHA256c8acf0aee7da80e58a3c2b1be24e553b1abd669b379ad3f85108b5ad61de6040
SHA512570df2cadb2ed564caf95ff1476933eb2ce5f31531a82e12636b2841dd10f738fee5c6bdbfe6ccd992002f3a196275cdd11d9da60a38caba4a1e2ff9d32e9101
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\epl-v10.html
Filesize16KB
MD5ed1191da9c4f74a60d695a25686f374e
SHA13a427657c16a716be332587425101653c25221d0
SHA256ab8cafd1958c27d70adc747259495e35592f8a06ae00969964f5f34f72896f3f
SHA51268098c1342f87939b3f57cd3e3a799ff316d2f1eb5c52f8d9c0c9e7c214281bff68a1260a91527b7175ad031798f42125cf9ee2e0d49772eb03b5836b67d9fbf
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\license.html
Filesize6KB
MD5657eb3527d651515f97b960a67d19fda
SHA127404b587183bc2f3b3b6919fbb91892f505b60d
SHA256f301745232a72d84f277980ad53b65d94b02479369e8b73fe0e6717adcf11a35
SHA5121085550a8844de081a216bd864990e56fbe91498fb6186cce435173ab73e29932e7b8182078cd2876039addbdb7e3c9769d7d7923f7ed2a5422e6a2a36321b70
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\epl-v10.html
Filesize12KB
MD5cdea5d1cccee27144519c75bcf3015bd
SHA1c36862abb1ada006b3dd4c28adc8b393a92fd325
SHA2561184f2316c36648a2d457b602c713d5d5eb980e86e5e8ed388e94a47f8573dbd
SHA5125d0ea1cef2af7111098c19578c42bfdfd7bb00ec3259fe026df6dd867a24f9a94f3299b035235e3cb87b1c9010f0d1be434a08318dae0412e03ecfdb439edfe9
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\license.html
Filesize9KB
MD5bc3e199345ad8ba54e2fe4acad95433d
SHA1c93cb69c27e1c03069de3c952534a52f391e3fb9
SHA256462c197c83ee3d677b07fe000b2c4e64ac4be4ceaaea80c1c77a5e67d832edd8
SHA512c1941c9106ff0d665dfee1888afcdc3c54e4db8fdb11e3313cd92a147a1084264dba8f1f9cbac5216d3c5ce1f97ff7f8d7d7493826ec3538d5db57a933fe32e4
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\about.html
Filesize14KB
MD559e4add1732aef6b8e228ecfb880c299
SHA131a6380e878f89ec9d2c83716fe42faafdd828db
SHA256089aaccbf4c17d2a0163f13820e926f8ce3122c9ed87e7e040a77439795b8fc4
SHA512461240638f98f92a0df94a6a76470d7ed3a9bf45f845b545ff37355efd4fb3efdbe592e563b6624d2e42374a3bf7682a572c3bfd96c21be87fc96ec3b3bcfbaf
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\about.html
Filesize16KB
MD526986f79440b7a706b65724e509f009f
SHA19d8ff0beef1c19fbecd28e3f632101acf3d02599
SHA256e59b7fa34b947d5ada478ff17543204251955052fdace284e5a285bd2abec5d1
SHA5122c240c4f7b8912bd5049bef22c2507c7c1af15432c860549d0f1ea35f03183270eb7315607fdf35be86703a61ec0ed7801e9e6ea627a026dbf93d98ff11d2ed6
-
Filesize
1KB
MD588c5c5706d2e237422eda18490dc6a59
SHA1bb8d12375f6b995301e756de2ef4fa3a3f6efd39
SHA2564756a234ed3d61fe187d9b6140792e54e7b757545edff82df594a507e528ed8e
SHA512a417270a0d46de5bb06a621c0383c893042a506524713f89ba55567df6e5c3ac8b198bce5a0300ec6e716897bb53fd3e8289a51240157dc743004517673d4ab7
-
Filesize
833KB
MD54a87a4d6677558706db4afaeeeb58d20
SHA17738dc6a459f8415f0265d36c626b48202cd6764
SHA25608b55f9b7dafc53dfc43f7f70cdd7048d231767745b76dc4474370fb323d7ae7
SHA512bedd8ed4975df3fcd4a0f575d6f38e3841e7a4b771baac4f72033102a070818b8539eb101c50563d89d4f3454899a1cedb33047b02e421256dedf9aaf258b594
-
Filesize
82KB
MD562cc135f9ec6ece2625c12a62e24ba5d
SHA18bb006d5e806ecd02f0a4184972caf4340a039ee
SHA256c3db040341a1f1788629ee24832c7828e0a267d659d71d296535a820eccc8658
SHA51228ea6c5e2e86f8383b29b28e579051ea10633d48c4d305a5f11f19d2f68d6181ea4dd0366e8828d19449b371fb112f6acb188502d2e9da582d82ce1a066e66a3