Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2024, 22:47
Behavioral task
behavioral1
Sample
cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe
Resource
win7-20241010-en
General
-
Target
cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe
-
Size
3.5MB
-
MD5
470e9fe6c02e6aa4cb615bb5e27a3901
-
SHA1
24d99a93454eabbb4fa12358e281daad7969e48b
-
SHA256
cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41
-
SHA512
2bef2f5dc44e0cd1792dca5c9ca422504ccaddda316f7dddfa1430abb7dc431f404eef92336cfd7d5f2f34715fb9bd1d28a20697462e2d617c15cb580d5349ab
-
SSDEEP
98304:Lnsmtk2aNXzhW148Pd+Tf1mpcOldJQ3/VY:zL6FK4s0TfLOdo/K
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Xred family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ._cache_cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ icsys.icn.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion icsys.icn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ._cache_cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ._cache_cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion icsys.icn.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 9 IoCs
pid Process 4652 ._cache_cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe 3896 Synaptics.exe 4260 ._cache_Synaptics.exe 2904 ._cache_synaptics.exe 1968 icsys.icn.exe 736 explorer.exe 1980 spoolsv.exe 1476 svchost.exe 1068 spoolsv.exe -
resource yara_rule behavioral2/files/0x000b000000023b8e-5.dat themida behavioral2/memory/4652-70-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/4260-192-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/files/0x0008000000023ba9-202.dat themida behavioral2/memory/1968-204-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/files/0x0009000000023bb6-212.dat themida behavioral2/memory/736-213-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/files/0x0009000000023bba-221.dat themida behavioral2/memory/1980-222-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/files/0x0009000000023bbc-230.dat themida behavioral2/memory/1476-231-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/1068-236-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/4260-247-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/1968-246-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/1980-244-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/1068-241-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/4652-248-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/736-305-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/1476-309-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/736-328-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/1476-329-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/1476-334-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/736-347-0x0000000000400000-0x0000000000A16000-memory.dmp themida -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ._cache_cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA icsys.icn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 4652 ._cache_cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe 4260 ._cache_Synaptics.exe 1968 icsys.icn.exe 736 explorer.exe 1980 spoolsv.exe 1476 svchost.exe 1068 spoolsv.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe ._cache_Synaptics.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1952 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 1968 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 736 explorer.exe 1476 svchost.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 4260 ._cache_Synaptics.exe 4260 ._cache_Synaptics.exe 1968 icsys.icn.exe 1968 icsys.icn.exe 736 explorer.exe 736 explorer.exe 1980 spoolsv.exe 1980 spoolsv.exe 1476 svchost.exe 1476 svchost.exe 1068 spoolsv.exe 1068 spoolsv.exe 1952 EXCEL.EXE 1952 EXCEL.EXE 1952 EXCEL.EXE 1952 EXCEL.EXE 1952 EXCEL.EXE 1952 EXCEL.EXE 1952 EXCEL.EXE 1952 EXCEL.EXE -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4068 wrote to memory of 4652 4068 cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe 83 PID 4068 wrote to memory of 4652 4068 cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe 83 PID 4068 wrote to memory of 4652 4068 cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe 83 PID 4068 wrote to memory of 3896 4068 cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe 84 PID 4068 wrote to memory of 3896 4068 cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe 84 PID 4068 wrote to memory of 3896 4068 cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe 84 PID 3896 wrote to memory of 4260 3896 Synaptics.exe 85 PID 3896 wrote to memory of 4260 3896 Synaptics.exe 85 PID 3896 wrote to memory of 4260 3896 Synaptics.exe 85 PID 4260 wrote to memory of 2904 4260 ._cache_Synaptics.exe 86 PID 4260 wrote to memory of 2904 4260 ._cache_Synaptics.exe 86 PID 4260 wrote to memory of 1968 4260 ._cache_Synaptics.exe 87 PID 4260 wrote to memory of 1968 4260 ._cache_Synaptics.exe 87 PID 4260 wrote to memory of 1968 4260 ._cache_Synaptics.exe 87 PID 1968 wrote to memory of 736 1968 icsys.icn.exe 88 PID 1968 wrote to memory of 736 1968 icsys.icn.exe 88 PID 1968 wrote to memory of 736 1968 icsys.icn.exe 88 PID 736 wrote to memory of 1980 736 explorer.exe 89 PID 736 wrote to memory of 1980 736 explorer.exe 89 PID 736 wrote to memory of 1980 736 explorer.exe 89 PID 1980 wrote to memory of 1476 1980 spoolsv.exe 90 PID 1980 wrote to memory of 1476 1980 spoolsv.exe 90 PID 1980 wrote to memory of 1476 1980 spoolsv.exe 90 PID 1476 wrote to memory of 1068 1476 svchost.exe 91 PID 1476 wrote to memory of 1068 1476 svchost.exe 91 PID 1476 wrote to memory of 1068 1476 svchost.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe"C:\Users\Admin\AppData\Local\Temp\cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\._cache_cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe"C:\Users\Admin\AppData\Local\Temp\._cache_cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4652
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4260 -
\??\c:\users\admin\appdata\local\temp\._cache_synaptics.exec:\users\admin\appdata\local\temp\._cache_synaptics.exe InjUpdate4⤵
- Executes dropped EXE
PID:2904
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:736 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe7⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1476 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1068
-
-
-
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1952
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD5470e9fe6c02e6aa4cb615bb5e27a3901
SHA124d99a93454eabbb4fa12358e281daad7969e48b
SHA256cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41
SHA5122bef2f5dc44e0cd1792dca5c9ca422504ccaddda316f7dddfa1430abb7dc431f404eef92336cfd7d5f2f34715fb9bd1d28a20697462e2d617c15cb580d5349ab
-
C:\Users\Admin\AppData\Local\Temp\._cache_cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe
Filesize2.7MB
MD51255bd40100c5d7b449389360a788d7b
SHA1bdf4375dccb6399df92dfbfdd466584b8e4323c8
SHA2563d0c58bad97ae8f453317f19e713b611e13ed7f661f0b119431cd9f17854197c
SHA5123955a21fef26aa3c991bb2079638d8ceafb5bafd4904c6d20d26a3764ff19847ab60812d9241cc8b6e11e49ea8143c2e9c03b349aa99c852c5c55b72659bf474
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
20KB
MD5d24ef6f39224e4611e95e4f3088b4bfb
SHA107ed1f5a8c7630f164d91f45d7f80d742ae95980
SHA256e5970816dd053aec064487288717b9403281071e3e06f24e28c72bd520cab311
SHA51210bce078de7f3cb850ddc4c110d43837c3c03908e9585e7d8b4f81f6d201dfcc262de5c93786332c8d3929399d6ad5af183dc5c90d1349c000f168aa1942cf48
-
Filesize
2.6MB
MD526c113e39ae04424e489d2d8dbd1fe5e
SHA13f8cb44f4405bac2f3fcdb24e2f48c2a5bc3c100
SHA256ee8bc585e30d385d8d2541629a7e9d11f9e23023bfeffcb3eafef8b8a57d5687
SHA5125f6599f10ccbfa99dfc77613bf5ac444f09b7073cf1fe2fa002bb4fd21aceda5e4782a9527dd86815fae79fe05c2ff68663e1822570497e47b452a0621e4b375
-
Filesize
139KB
MD5c30802b4db31df6154dc0d7f4e243915
SHA1d309150998a6f27ea31c34ee061b3ce2dbb39c47
SHA256d3d17298181eec362876e9f05757d2f282dccac7a4074a8e3589158038a97302
SHA512aa6c589158e6d9b684515534df891638a0e32741cd701c46c47fd86040e885eba55804779ce60f5337ea4cd6f52f17c2c39251352678df5b88a74a01b24b0fce
-
Filesize
2.6MB
MD5cc3f5c8b37c7f0dfd8a535769cd3dd60
SHA1057d0024734b88af56aeef2802e3b5db7784e05a
SHA256970f2f8293e95078cab3015d863b8bdca043a2abca40f1a209c57f35ed742e57
SHA512a96bc2490f879a2e80efa6d0b0dfc949fa77c074cd620ecc5dcff386e679df83bc13b1724201ac4c052dbed557abf8dc9e0c55377d61555abc4cfc6766d8ff9e
-
Filesize
2.6MB
MD597faf8a376c3b41910cea02adef93ca3
SHA133660eb0d5604ec1771404545bbfd9348b5e7429
SHA2563af195a69dfadb34a0931826b5ff50c8aa3e47cf868a4b1cd907badab5aa1871
SHA512e193382d7b7c3caf5345d88b2b87601cfe759a4976af645b32d9cc50ff6ec86b87e31d03312da7efd2cf77dd647e025fcbfe6d55fe213a25a83af003e3e11ed8
-
Filesize
2.6MB
MD549e3bbeb36245e50bb4c6328756907e5
SHA1981f8b4bf57637f785674c529354f3b8b3ccebd7
SHA256a2231d467f8a338aab96524f848abffbbfdd325ba8831b3319732321c31bafc4
SHA512357858a8b43d4be40f3291df3bae38f4d02ad1bd98fcce07f3bd290dd820878c0a3792bb64614aa85bc7c057408294a7d59cd8041028ca603e08a7f468d83779