Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe
Resource
win10v2004-20241007-en
General
-
Target
8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe
-
Size
64KB
-
MD5
d098ed5d12ec03c894ce42da6e38c2d6
-
SHA1
2e2a54824aba72e90d634d255999b2eee9503306
-
SHA256
8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b
-
SHA512
5b9df34ad34cc2f9d46580654144008976124c00752c95d3adbe275159de1d06a4077658fc42846590511947d0fdef4f9372c36196eb2759b56891eaaa03842f
-
SSDEEP
1536:9VB9ew1O/1hhDiZnHba3W74s3KdWGGZttlI6TRqnouy8hyG+jKY:9Ve1fh8nHbao6dWntI6TRyouthyLv
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "rundll32.exe" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "rundll32.exe" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\attrib.exe 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\attrib.exe\Debugger = "rundll32.exe" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe -
Executes dropped EXE 3 IoCs
pid Process 1860 svchost.exe 2132 wmplayerc.exe 1832 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2328 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe 2328 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\ = "File Folder" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Media Player = "C:\\Program Files (x86)\\Windows Media Player\\wmplayerc.exe" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe -
Drops desktop.ini file(s) 10 IoCs
description ioc Process File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification F:\RÊCYCLÊR\desktop.ini 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened for modification C:\Users\Admin\Documents\RÊCYCLÊR\desktop.ini 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\RÊCYCLÊR\desktop.ini 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe -
Enumerates connected drives 3 TTPs 44 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\G: 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened (read-only) \??\J: 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened (read-only) \??\Y: 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\I: 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened (read-only) \??\N: 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened (read-only) \??\U: 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\W: 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened (read-only) \??\Z: 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\H: 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened (read-only) \??\K: 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\E: 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened (read-only) \??\L: 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened (read-only) \??\M: 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened (read-only) \??\T: 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\O: 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened (read-only) \??\R: 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened (read-only) \??\V: 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\P: 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened (read-only) \??\Q: 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened (read-only) \??\S: 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\X: 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\Autorun.inf 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened for modification C:\Autorun.inf 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Media Player\wmplayerc.exe 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmplayerc.exe 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File opened for modification C:\Program Files (x86)\Windows Media Player\svchost.exe 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe File created C:\Program Files (x86)\Windows Media Player\wmplayerc.exe wmplayerc.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmplayerc.exe wmplayerc.exe File opened for modification C:\Program Files (x86)\Windows Media Player\svchost.exe wmplayerc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayerc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpshare.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe -
Kills process with taskkill 1 IoCs
pid Process 2304 taskkill.exe -
Modifies Control Panel 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\HungAppTimeout = "111" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\WaitToKillAppTimeout = "111" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\AutoEndTasks = "1" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\ = "File Folder" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2132 wmplayerc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2304 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2940 wmplayer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1860 svchost.exe 1832 svchost.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2328 wrote to memory of 1860 2328 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe 29 PID 2328 wrote to memory of 1860 2328 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe 29 PID 2328 wrote to memory of 1860 2328 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe 29 PID 2328 wrote to memory of 1860 2328 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe 29 PID 2328 wrote to memory of 2940 2328 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe 30 PID 2328 wrote to memory of 2940 2328 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe 30 PID 2328 wrote to memory of 2940 2328 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe 30 PID 2328 wrote to memory of 2940 2328 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe 30 PID 2328 wrote to memory of 2304 2328 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe 31 PID 2328 wrote to memory of 2304 2328 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe 31 PID 2328 wrote to memory of 2304 2328 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe 31 PID 2328 wrote to memory of 2304 2328 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe 31 PID 2328 wrote to memory of 2132 2328 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe 32 PID 2328 wrote to memory of 2132 2328 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe 32 PID 2328 wrote to memory of 2132 2328 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe 32 PID 2328 wrote to memory of 2132 2328 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe 32 PID 2132 wrote to memory of 1832 2132 wmplayerc.exe 34 PID 2132 wrote to memory of 1832 2132 wmplayerc.exe 34 PID 2132 wrote to memory of 1832 2132 wmplayerc.exe 34 PID 2132 wrote to memory of 1832 2132 wmplayerc.exe 34 PID 2940 wrote to memory of 2104 2940 wmplayer.exe 37 PID 2940 wrote to memory of 2104 2940 wmplayer.exe 37 PID 2940 wrote to memory of 2104 2940 wmplayer.exe 37 PID 2940 wrote to memory of 2104 2940 wmplayer.exe 37 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe"C:\Users\Admin\AppData\Local\Temp\8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Event Triggered Execution: Image File Execution Options Injection
- Loads dropped DLL
- Modifies system executable filetype association
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2328 -
C:\Program Files (x86)\Windows Media Player\svchost.exe"C:\Program Files (x86)\Windows Media Player\svchost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1860
-
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"2⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Windows Media Player\wmpshare.exe"C:\Program Files (x86)\Windows Media Player\wmpshare.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2104
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "8f5c02636a6977ae7045a1325c005b8f76897678320dd84a2ea1d2458a5a530b.exe"2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
C:\Program Files (x86)\Windows Media Player\wmplayerc.exe"C:\Program Files (x86)\Windows Media Player\wmplayerc.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Windows Media Player\svchost.exe"C:\Program Files (x86)\Windows Media Player\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1832
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify Tools
3Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5584ce8bcd32e8151fdcef49313bf4403
SHA1854a02c7ea29db78c3fd549777f491f2d6ea903a
SHA2564ffc358c469505d71ff8256c5d3bb24a662a600bee8cc94dc04e4d80f74d0092
SHA5121e2289922c5285b8ae954e62fa0bbd9bc163e4e766cc2d62149c2fcfd6a20c8f41cac0477547752c2a9a642fcac09b83f90e142ce63605254bf5f28663a8b1f6
-
Filesize
65B
MD5ad0b0b4416f06af436328a3c12dc491b
SHA1743c7ad130780de78ccbf75aa6f84298720ad3fa
SHA25623521de51ca1db2bc7b18e41de7693542235284667bf85f6c31902547a947416
SHA512884cd0cae3b31a594f387dae94fc1e0aacb4fd833f8a3368bdec7de0f9f3dc44337c7318895d9549aad579f95de71ff45e1618e75065a04c7894ad1d0d0eac56
-
Filesize
64KB
MD50493e603218b3fbbeceaebc9867469f8
SHA117ae0c5609862becc7aded4acafef54ee28fc3cf
SHA256c43c0fc797cbbe767318ac312b948ef4cf20588091289a546ed17dddbc049701
SHA5124f41c68707cb4727479931c36060928e3e377baefdc31ef75889419f4e8305780ad79f55a23e2a52514349058c3117c2069ec6f33d212a5db3a93e1f5d863a2d
-
C:\Users\Admin\AppData\Local\Microsoft\Media Player\Art Cache\LocalMLS\{3BA23399-FCC7-421D-837A-1CF325062197}.jpg
Filesize23KB
MD5fd5fd28e41676618aac733b243ad54db
SHA1b2d69ad6a2e22c30ef1806ac4f990790c3b44763
SHA256a26544648ef8ceffad6c789a3677031be3c515918627d7c8f8e0587d3033c431
SHA5124c32623796679be7066b719f231d08d24341784ecfd5d6461e8140379f5b394216e446865df56e05b5f1e36962c9d34d2b5041275366aeabcd606f4536217fe4
-
C:\Users\Admin\AppData\Local\Microsoft\Media Player\Art Cache\LocalMLS\{E65DE84E-BC4D-46CB-BF30-0C193D543E51}.jpg
Filesize22KB
MD535e787587cd3fa8ed360036c9fca3df2
SHA184c76a25c6fe336f6559c033917a4c327279886d
SHA25698c49a68ee578e10947209ebc17c0ad188ed39c7d0c91a2b505f317259c0c9b2
SHA512aeec3eed5a52670f4cc35935005bb04bb435964a1975e489b8e101adfbce278142fd1a6c475860b7ccb414afe5e24613361a66d92f457937de9b21a7a112e1f9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DUME8XYE\6ON6VS51.htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
Filesize
32KB
MD584bba83cfbc0233517407678bb842686
SHA11c617de788de380d28c52dc733ad580c3745a1c1
SHA2566ecf98adb3cd0931ec803f3a56a9563c7d60bb86ec1886b21e3d0f7eb25198d9
SHA512a6a80c00a28c43c1c427018e6fb6dac4682d299d2f50202f520af0b1bca803546c850f04094ed2f532ff8775f6d45f2a40e4f5e069937bcaa0326a80bd818e0e
-
Filesize
9KB
MD5a3565eec669697a3d6f7b35fb75fcb26
SHA16e81f83c057ff5da8f800a23f32f717a3e0ca2dc
SHA256a7e6bd8d46e6eb541a071fb8a94b9567ecbb1c353764e36fae8b6f41b4a3d1d5
SHA5120f815447afd11be56e49455bb4246b6e31063ae5f72743109a644d4d0fb0c79e78cf7b9bf17b19684fba25a72a66b2e4ad6a481871ae6792472a9e9942a20032