Overview
overview
10Static
static
100.46582298...58.exe
windows7-x64
700331dd25b...3a.exe
windows7-x64
10065988f36f...a0.exe
windows7-x64
30826716413...57.exe
windows7-x64
1008cf8ed94c...a4.exe
windows7-x64
100997ba7292...3c.exe
windows7-x64
30b7996bca4...5f.exe
windows7-x64
0c3431dbb8...ui.dll
windows7-x64
50cd7440ca9...bc.exe
windows7-x64
10100b8bfff5...ir.exe
windows7-x64
3101.ex_.exe
windows7-x64
3119.executable.exe
windows7-x64
6119.unp.exe
windows7-x64
611abb44de5...47.exe
windows7-x64
1011fb52c968...22.exe
windows7-x64
10123.exe
windows7-x64
1139.exe
windows7-x64
113E418BF18...73.dll
windows7-x64
3144.exe
windows7-x64
117697e1829...44.dll
windows7-x64
319561b3379...er.exe
windows7-x64
1019ec0d0e51...C5.exe
windows7-x64
71a6bed2aff...f2.exe
windows7-x64
101f210c60f9...40.exe
windows7-x64
101f3509cc11...dd.exe
windows7-x64
1020c6d29da8...7d.exe
windows7-x64
9234e77145d...2d.exe
windows7-x64
10263fc6fc9e...32.exe
windows7-x64
92e0da054d0...23.zip
windows7-x64
9Compenso.P...__.exe
windows7-x64
9301a3f5017...5f.exe
windows7-x64
1030620.ex_.exe
windows7-x64
10Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 02:14
Behavioral task
behavioral1
Sample
0.4658229854220858.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
00331dd25b83984d4b6d9753fec2b306e88ac87371ea48188df49cb630905d3a.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
065988f36f3ab99ff40893c7ad756cfcc3baea1b8b5217f17cdd6e44160df0a0.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
082671641341d89fe49d0da717846035ba6af02edb59840148eddc3586d21557.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
08cf8ed94cc1ef6ae23133f3e506a50d8aad9047c6fa74568a0373d991261aa4.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
0997ba7292ddbac1c7e7ade6766ed53c.exe
Resource
win7-20240708-en
Behavioral task
behavioral7
Sample
0b7996bca486575be15e68dba7cbd802b1e5f90436ba23f802da66292c8a055f.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
0c3431dbb8cd0478250eb4357257880e_localui.dll
Resource
win7-20241023-en
Behavioral task
behavioral9
Sample
0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
100b8bfff550fb74c98a2ef9a71d4bb53553d2d7ba509bb451fe32814ec57e48.exe.vir.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
101.ex_.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
119.executable.exe
Resource
win7-20241010-en
Behavioral task
behavioral13
Sample
119.unp.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
11abb44de53807e32980a010a473514694f901841e63ab33f5e0ff8754009b47.exe
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
11fb52c96853e12f011b7b7894e9884e56eb5522.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
123.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
139.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
13E418BF18B03AC80580DB69ADA305A2B7093DFED00692DCF91A99D2526D3A73.dll
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
144.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
17697e1829f0d18d2051a67bc2bca134_da3ded254909e9abaa46eb5bc3b10944.dll
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
19ec0d0e5143940492a1c79c06eb8f18aa9feb356e41b8b79fdc6a16a3bcd7bf_TDS=4F9B33C5.exe
Resource
win7-20241010-en
Behavioral task
behavioral23
Sample
1a6bed2afff1b9880e42a29cea9b8139bcb12e34085fb008de13aa983b82a4f2.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
1f210c60f90fd8403099482455f3220b56b2864bc4d2b6af0abda4a2c3854d40.exe
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
1f3509cc11ffa1f7d839df93615cf1ba0819d75cafd5ef59110d9b01fb90addd.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
20c6d29da875075afa0ed7b4fb58e555de89d4bed13bf5ad109817c593ddd77d.exe
Resource
win7-20241023-en
Behavioral task
behavioral27
Sample
234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
263fc6fc9efa4c05a08d9ff1fc7bb060a7b8f376f82afa17fd3fc267bc8e8032.exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
2e0da054d03fde4e7b2c2057cc4aa410c64b6ab8777ee6d4fd43f031a5170a23.zip
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
Compenso.Pdf______________________________________________________________.exe
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
30620.ex_.exe
Resource
win7-20241010-en
General
-
Target
0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe
-
Size
1.6MB
-
MD5
16d202aac28076f3c4c1bec60f356f7b
-
SHA1
4d9592f4b3f4ea12b245c531b93082ccfd6fd292
-
SHA256
0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc
-
SHA512
9f70ed2f374a82fb03d58a22cceb33f1ee8eef7bc8d97bca67c5240aa6b60d201d88415cc2501b635ff53be7fde1f0a08b036a2ffc8d29c5f71b4c0db52deaf4
-
SSDEEP
24576:EFwvcMczi2I0CHpQlDOk0Uig4dMwbQ4Mf7Pgw433naEtl1:EqXczupQbZ4Z8v7PgwwnaE1
Malware Config
Extracted
Protocol: ftp- Host:
ftp.free3v.net - Port:
21 - Username:
money8 - Password:
12345678
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 64 IoCs
Processes:
0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exedescription ioc process File created C:\Windows\SysWOW64\certutil.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\hdwwiz.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\msinfo32.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\where.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\mtstocom.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\ntprint.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\tcmsetup.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\eudcedit.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\gpresult.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\tasklist.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\Robocopy.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\ROUTE.EXE 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\tracerpt.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\userinit.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\regedit.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\ComputerDefaults.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\dvdupgrd.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\MuiUnattend.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\wextract.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\System32\DriverStore\FileRepository\brmfcmf.inf_amd64_neutral_67b5984f8e8ff717\BrmfRsmg.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\migwiz\migwiz.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\msfeedssync.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\PresentationHost.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\waitfor.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\IME\IMEJP10\imjppdmg.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\driverquery.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\getmac.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\isoburn.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\upnpcont.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\forfiles.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\TsWpfWrp.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\wiaacmgr.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\xcopy.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\System32\DriverStore\FileRepository\divacx64.inf_amd64_neutral_fa0f82f024789743\xlog.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\wbem\WMIC.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\msiexec.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\sc.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\user.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\wimserv.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\cipher.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\RMActivate.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\Utilman.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\System32\DriverStore\FileRepository\brmfcwia.inf_amd64_neutral_817b8835aed3d6b7\BrmfRsmg.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\calc.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\migwiz\PostMig.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\notepad.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\SystemPropertiesRemote.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\TapiUnattend.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\com\comrepl.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\ddodiag.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\lodctr.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\Magnify.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\mmc.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\verifier.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\ntkrnlpa.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\pcaui.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\verclsid.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\choice.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\cmstp.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\diantz.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\logagent.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\dxdiag.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\PATHPING.EXE 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\SysWOW64\regedt32.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe -
Processes:
resource yara_rule behavioral9/memory/2516-8-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-7-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-60-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-59-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-58-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-57-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-54-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-52-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-49-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-47-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-44-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-42-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-40-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-37-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-35-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-33-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-28-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-29-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-26-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-24-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-21-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-19-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-17-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-14-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-12-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral9/memory/2516-9-0x0000000010000000-0x000000001003F000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
Processes:
0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Program Files\Windows Media Player\wmpconfig.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Program Files (x86)\Internet Explorer\ielowutil.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Program Files\Windows Media Player\WMPDMC.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\ODeploy.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DW20.EXE 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOICONS.EXE 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSQRY32.EXE 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Program Files (x86)\Windows Media Player\WMPDMC.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\vsta_ep32.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Program Files\Internet Explorer\iexplore.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEContentService.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Program Files (x86)\Windows Media Player\wmpenc.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\mip.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Program Files\Windows Media Player\WMPSideShowGadget.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Program Files (x86)\Windows Media Player\wmprph.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe -
Drops file in Windows directory 64 IoCs
Processes:
0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exedescription ioc process File created C:\Windows\winsxs\x86_microsoft-windows-driververifier_31bf3856ad364e35_6.1.7600.16385_none_ba42313afe0efbbb\verifier.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-ping-utilities_31bf3856ad364e35_6.1.7600.16385_none_052696aea98bcefc\PATHPING.EXE 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-registry-editor_31bf3856ad364e35_6.1.7600.16385_none_5023a70bf589ad3e\regedt32.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\x86_microsoft-windows-ddodiag_31bf3856ad364e35_6.1.7600.16385_none_362ce835fe42421b\ddodiag.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-robocopy_31bf3856ad364e35_6.1.7601.17514_none_252d34f00303c6fa\Robocopy.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\x86_microsoft-windows-efs-ui_31bf3856ad364e35_6.1.7600.16385_none_f64b1e25e8ea1172\efsui.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\x86_microsoft-windows-ie-iexpress_31bf3856ad364e35_8.0.7600.16385_none_7f0c7a3c17077fce\wextract.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\ServiceModelReg.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..xing-service-server_31bf3856ad364e35_6.1.7601.17514_none_0db5e5844ed6ffe9\CISVC.EXE 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-migrationengine_31bf3856ad364e35_6.1.7601.17514_none_b6cddd21f1df8715\mighost.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-newdev_31bf3856ad364e35_6.1.7600.16385_none_6d6b3cfb6a5a1e5a\ndadmin.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_subsystem-for-unix-based-applications_31bf3856ad364e35_6.1.7601.17514_none_d20e5d35068f261a\psxss.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\wow64_microsoft-windows-coreusermodepnp_31bf3856ad364e35_6.1.7601.17514_none_df7c5af777ec4541\drvinst.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\x86_microsoft-windows-s..opertiesperformance_31bf3856ad364e35_6.1.7600.16385_none_5aad0353642dd29f\SystemPropertiesPerformance.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\WsatConfig.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p..ncetoolscommandline_31bf3856ad364e35_6.1.7601.17514_none_bf4980401574a899\typeperf.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-r..eak-diagnostic-core_31bf3856ad364e35_6.1.7600.16385_none_b70694aa97134f37\rdrleakdiag.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Windows\winsxs\amd64_microsoft-windows-s..boxgames-backgammon_31bf3856ad364e35_6.1.7600.16385_none_668d031845881638\bckgzm.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-vssservice_31bf3856ad364e35_6.1.7601.17514_none_b8f2d3e62e76fe08\VSSVC.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.1.7601.17514_none_79642285ffd2a388\iisreset.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\x86_microsoft-windows-systray_31bf3856ad364e35_6.1.7600.16385_none_f327d2f6575da8ce\systray.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\MSBuild\1a154709cdfe214029ea88c51ab2b579\MSBuild.ni.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\Microsoft.Workflow.Compiler.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-calc_31bf3856ad364e35_6.1.7600.16385_none_05b2f2e2346cfea4\calc.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.1.7600.16385_none_2b54b20ee6fa07b1\services.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_wpf-presentationfontcache_31bf3856ad364e35_6.1.7601.17514_none_63bf9c3e28cd9bfb\PresentationFontCache.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-defrag-adminui_31bf3856ad364e35_6.1.7601.17514_none_f73c142da6e47daa\dfrgui.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-ie-feedsbs_31bf3856ad364e35_8.0.7601.17514_none_752e3bb068638683\msfeedssync.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-speech-userexperience_31bf3856ad364e35_6.1.7601.17514_none_7a2ff57a626c29fd\SpeechUXTutorial.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-systray_31bf3856ad364e35_6.1.7600.16385_none_4f466e7a0fbb1a04\systray.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-grpconv_31bf3856ad364e35_6.1.7600.16385_none_fe7d1685575edfa6\grpconv.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-security-tools-nltest_31bf3856ad364e35_6.1.7601.17514_none_f8852afc12f84e8e\nltest.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\x86_microsoft-windows-tcpip-utility_31bf3856ad364e35_6.1.7601.17514_none_34ce5d95ad203bbe\MRINFO.EXE 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\x86_netfx35linq-csharp_31bf3856ad364e35_6.1.7601.17514_none_193318f5726bf1d7\csc.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p..installerandprintui_31bf3856ad364e35_6.1.7601.17514_none_347a450f0c8bd52d\printui.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_wcf-icardagt_exe_31bf3856ad364e35_6.1.7600.16385_none_8dcc9c6f8b58a5eb\icardagt.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\wow64_microsoft-windows-performancetoolsgui_31bf3856ad364e35_6.1.7601.17514_none_04846decebf43c4c\resmon.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\x86_microsoft-windows-cttune_31bf3856ad364e35_6.1.7600.16385_none_b35ae2951fd8adbc\cttune.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-msconfig-exe_31bf3856ad364e35_6.1.7601.17514_none_38a043f2b45f9ad2\msconfig.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\Backup\x86_microsoft-windows-wininit_31bf3856ad364e35_6.1.7600.16385_none_30c90ef265a43c13_wininit.exe_7a527f28 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\assembly\GAC_MSIL\ehexthost\6.1.0.0__31bf3856ad364e35\ehexthost.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-extrac32_31bf3856ad364e35_6.1.7600.16385_none_371e8c461d966a55\extrac32.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-ie-internetexplorer_31bf3856ad364e35_11.2.9600.16428_none_11b913172f0cb26f\ieUnatt.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-m..-odbc-administrator_31bf3856ad364e35_6.1.7600.16385_none_a044d905576812d4\odbcad32.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\x86_microsoft-windows-net1-command-line-tool_31bf3856ad364e35_6.1.7601.17514_none_88e35d5cb2d54359\net1.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\x86_microsoft-windows-sethc_31bf3856ad364e35_6.1.7601.17514_none_64c7a8e4d35d675c\sethc.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\x86_netfx35linq-vb_compiler_orcas_31bf3856ad364e35_6.1.7601.17514_none_9809be824da2c173\vbc.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\ehome\McxTask.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-clientcmdtools_31bf3856ad364e35_6.1.7600.16385_none_ad5854ca0a23343d\umount.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-s..estartup-fverecover_31bf3856ad364e35_6.1.7600.16385_none_ab0552bceeca5a61\BdeUnlockWizard.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-b..vironment-os-loader_31bf3856ad364e35_6.1.7601.17514_none_b94cbfa183466a89_winresume.exe_85cd1215 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_6.1.7601.17514_none_678566b7ddea04a5\PkgMgr.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\x86_microsoft-windows-m..ommandlineutilities_31bf3856ad364e35_6.1.7600.16385_none_7cf343cac8a829ec\find.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\x86_microsoft-windows-where_31bf3856ad364e35_6.1.7600.16385_none_5da98f433f7e2878\where.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-cttunesvr_31bf3856ad364e35_6.1.7600.16385_none_4befc8eb38093bb1\cttunesvr.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ing-management-core_31bf3856ad364e35_6.1.7601.17514_none_895a2b74415ea575\DismHost.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-s..up-drivepreparation_31bf3856ad364e35_6.1.7601.17514_none_ff178cca7f9d03eb\BdeHdCfg.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\regtlibv12.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ilasm.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\Microsoft.NET\Framework64\v3.5\AddInProcess32.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-fsutil_31bf3856ad364e35_6.1.7600.16385_none_28590620099da2d8\fsutil.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe File created C:\Windows\winsxs\wow64_microsoft-windows-m..onwizardapplication_31bf3856ad364e35_6.1.7601.17514_none_22f5c6aadf559287\MigSetup.exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 6 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2636 taskkill.exe 2976 taskkill.exe 2912 taskkill.exe 2616 taskkill.exe 1712 taskkill.exe 2828 taskkill.exe -
Modifies registry class 16 IoCs
Processes:
0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ec\DefaultIcon 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\E.Document 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\E.Document\DefaultIcon\ = "C:\\WINDOWS\\ME\\ÃÎ÷ÊÔ´Âë.ico,0" 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exe\ 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exe\DefaultIcon 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ec\DefaultIcon\ = "C:\\WINDOWS\\ME\\ÃÎ÷ÊÄ£¿é.ico,0" 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exe\Shell\Open 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exe\Shell\Open\Command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe\" \"%1\"" 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exe" 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ec 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\E.Document\DefaultIcon 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exe 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exe\Shell\Open\Command 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exe\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe,0" 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\exe\EditFlags = "2" 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exe\Shell 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2912 taskkill.exe Token: SeDebugPrivilege 2616 taskkill.exe Token: SeDebugPrivilege 2636 taskkill.exe Token: SeDebugPrivilege 2976 taskkill.exe Token: SeDebugPrivilege 2828 taskkill.exe Token: SeDebugPrivilege 1712 taskkill.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exepid process 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exedescription pid process target process PID 2516 wrote to memory of 2616 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe PID 2516 wrote to memory of 2616 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe PID 2516 wrote to memory of 2616 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe PID 2516 wrote to memory of 2616 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe PID 2516 wrote to memory of 2912 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe PID 2516 wrote to memory of 2912 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe PID 2516 wrote to memory of 2912 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe PID 2516 wrote to memory of 2912 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe PID 2516 wrote to memory of 2976 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe PID 2516 wrote to memory of 2976 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe PID 2516 wrote to memory of 2976 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe PID 2516 wrote to memory of 2976 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe PID 2516 wrote to memory of 1712 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe PID 2516 wrote to memory of 1712 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe PID 2516 wrote to memory of 1712 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe PID 2516 wrote to memory of 1712 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe PID 2516 wrote to memory of 2636 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe PID 2516 wrote to memory of 2636 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe PID 2516 wrote to memory of 2636 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe PID 2516 wrote to memory of 2636 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe PID 2516 wrote to memory of 2828 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe PID 2516 wrote to memory of 2828 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe PID 2516 wrote to memory of 2828 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe PID 2516 wrote to memory of 2828 2516 0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe"C:\Users\Admin\AppData\Local\Temp\0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im kavsvc.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im KVXP.kxp2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Rav.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ravmon.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Mcshield.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im VsTskMgr.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2828
-