Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 21:26
Behavioral task
behavioral1
Sample
7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe
Resource
win10v2004-20241007-en
General
-
Target
7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe
-
Size
1.7MB
-
MD5
53c464e46cda5fddb007f1789ba2c1e0
-
SHA1
d05df0b721019d87270b689abb3bd671335ade7e
-
SHA256
7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910c
-
SHA512
4212b27f5916d20a37d86e6e70298148a7d63e4f77d0a257285156c2f4c2ba6541edf7da85d54e6044afd0bb1449beca26d71ad7dff388a6cf60a67438b3e3f8
-
SSDEEP
24576:cFOaynsJ39LyjbJkQFMhmC+6GD9WFOaJ3rCEB0CEM:s2nsHyjtk2MYC5GD0F3rTB0TM
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
svchost.exeexplorer.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Synaptics.exe7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cn.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cn.exe -
Executes dropped EXE 11 IoCs
Processes:
7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cn.exe icsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exeSynaptics.exe._cache_Synaptics.exe._cache_synaptics.exe icsys.icn.exeexplorer.exepid Process 1692 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cn.exe 1420 icsys.icn.exe 3124 explorer.exe 3976 spoolsv.exe 4580 svchost.exe 948 spoolsv.exe 2248 Synaptics.exe 1604 ._cache_Synaptics.exe 388 ._cache_synaptics.exe 1788 icsys.icn.exe 5028 explorer.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cn.exe explorer.exesvchost.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 6 IoCs
Processes:
explorer.exe7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exeicsys.icn.exespoolsv.exe._cache_Synaptics.exedescription ioc Process File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe ._cache_Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
._cache_Synaptics.exe._cache_synaptics.exe icsys.icn.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exe7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cn.exe Synaptics.exeexplorer.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
Processes:
7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cn.exe Synaptics.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 3032 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exeicsys.icn.exepid Process 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 1420 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid Process 3124 explorer.exe 4580 svchost.exe -
Suspicious use of SetWindowsHookEx 26 IoCs
Processes:
7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exe._cache_Synaptics.exeEXCEL.EXEicsys.icn.exeexplorer.exepid Process 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 1420 icsys.icn.exe 1420 icsys.icn.exe 3124 explorer.exe 3124 explorer.exe 3976 spoolsv.exe 3976 spoolsv.exe 4580 svchost.exe 4580 svchost.exe 948 spoolsv.exe 948 spoolsv.exe 1604 ._cache_Synaptics.exe 1604 ._cache_Synaptics.exe 3032 EXCEL.EXE 3032 EXCEL.EXE 1788 icsys.icn.exe 1788 icsys.icn.exe 5028 explorer.exe 5028 explorer.exe 3032 EXCEL.EXE 3032 EXCEL.EXE 3032 EXCEL.EXE 3032 EXCEL.EXE 3032 EXCEL.EXE 3032 EXCEL.EXE -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exe7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cn.exe Synaptics.exe._cache_Synaptics.exeicsys.icn.exedescription pid Process procid_target PID 1668 wrote to memory of 1692 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 82 PID 1668 wrote to memory of 1692 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 82 PID 1668 wrote to memory of 1692 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 82 PID 1668 wrote to memory of 1420 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 83 PID 1668 wrote to memory of 1420 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 83 PID 1668 wrote to memory of 1420 1668 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe 83 PID 1420 wrote to memory of 3124 1420 icsys.icn.exe 84 PID 1420 wrote to memory of 3124 1420 icsys.icn.exe 84 PID 1420 wrote to memory of 3124 1420 icsys.icn.exe 84 PID 3124 wrote to memory of 3976 3124 explorer.exe 85 PID 3124 wrote to memory of 3976 3124 explorer.exe 85 PID 3124 wrote to memory of 3976 3124 explorer.exe 85 PID 3976 wrote to memory of 4580 3976 spoolsv.exe 86 PID 3976 wrote to memory of 4580 3976 spoolsv.exe 86 PID 3976 wrote to memory of 4580 3976 spoolsv.exe 86 PID 4580 wrote to memory of 948 4580 svchost.exe 87 PID 4580 wrote to memory of 948 4580 svchost.exe 87 PID 4580 wrote to memory of 948 4580 svchost.exe 87 PID 1692 wrote to memory of 2248 1692 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cn.exe 88 PID 1692 wrote to memory of 2248 1692 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cn.exe 88 PID 1692 wrote to memory of 2248 1692 7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cn.exe 88 PID 2248 wrote to memory of 1604 2248 Synaptics.exe 89 PID 2248 wrote to memory of 1604 2248 Synaptics.exe 89 PID 2248 wrote to memory of 1604 2248 Synaptics.exe 89 PID 1604 wrote to memory of 388 1604 ._cache_Synaptics.exe 91 PID 1604 wrote to memory of 388 1604 ._cache_Synaptics.exe 91 PID 1604 wrote to memory of 388 1604 ._cache_Synaptics.exe 91 PID 1604 wrote to memory of 1788 1604 ._cache_Synaptics.exe 95 PID 1604 wrote to memory of 1788 1604 ._cache_Synaptics.exe 95 PID 1604 wrote to memory of 1788 1604 ._cache_Synaptics.exe 95 PID 1788 wrote to memory of 5028 1788 icsys.icn.exe 96 PID 1788 wrote to memory of 5028 1788 icsys.icn.exe 96 PID 1788 wrote to memory of 5028 1788 icsys.icn.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe"C:\Users\Admin\AppData\Local\Temp\7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cN.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
\??\c:\users\admin\appdata\local\temp\7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cn.exec:\users\admin\appdata\local\temp\7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cn.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
\??\c:\users\admin\appdata\local\temp\._cache_synaptics.exec:\users\admin\appdata\local\temp\._cache_synaptics.exe InjUpdate5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:388
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1788 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5028
-
-
-
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1420 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3124 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3976 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4580 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:948
-
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3032
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
899KB
MD511a6fb4ad7b1fb1e0bcebdca0cf49edd
SHA1a002a246a67ca8ceca167aff546ffd08b912cbd6
SHA25675ce2a0f53b6b89d40a1da350abf2cafc46b67722606f8e5359115dc4934e15a
SHA5128ba2cdea360058f3c10ebe3f01d5a4d5268d6a4f091619dd9ef21926e6607b6cdbc32128ed5f9e1a3223c5cf93b289262eb5a21517838bab471ef5cd0c7039fa
-
Filesize
764KB
MD5aed655395747a6602479f6032d3c099f
SHA15fcbd5735ed0e4a013667652f4c1382abb45203a
SHA2563d6123dc6ffbd1a11d73229988203052809bd17617b24a034c1122c8f4983db4
SHA5121a3db9e195e9e504a0a6c24557f1e141f90a73a89a853b8ad3ab2248d8e3fd97ba1ae78b93ad33005590ef0a44c5237e608b66a9c9fffde39e4730c226d91637
-
Filesize
25KB
MD56ec2b5917c7920efab6b8876a0803d6b
SHA1caeb4b1e116e695c62376f710e3c33e3db36b65c
SHA2564a6f119db3935f5794ff3248d6b556741034dd40bac52a9404f48e1a189f05a7
SHA512c3cd05e8f1d4e6a701d25862a66809531b0805e367af508755a8aebf2e5aad5726a9f93074411fd1c8ae1533c583843e55e5c8de53215152125160dc39f49123
-
C:\Users\Admin\AppData\Local\Temp\7852dcf9b2ed09cec28c2b7bcfe8f04a1e110cdb65f42d27e4162dcb6993910cn.exe
Filesize1.6MB
MD5180d44a32e631c7ff3f3f2212d224607
SHA142c23652a3371298624924d5acbea00a78d26346
SHA25658035e8b4a83c2a660a1fa095b4bfa13d605d286460fef6047eedf0648ecd49b
SHA512c1026d1ff4fd707318ffd6b54d4ad63215fa95c8016144cbfffa941ff1b2fc41de4759e61ea442284bff5887a26a2d778f8fc4f16717b4dc64d842998ce8be5f
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
135KB
MD53cfd036006e177d4b81a8064f9dbb754
SHA178d5c339cfe73090a4dcee53e51e8307ea39cdd5
SHA2566ddc9e761b370e2a2ce6f3090cc1aca538825899dacd95bd371f714b8f2d8dd9
SHA51231e7a3cb1f6230138599fcedd93212adf3881c9fcaaf9a02f2b11bd9a60382f4f66a18478dfeef396e5131da290289e99aa15197e0a3d12448d9cdcc9358e907
-
Filesize
135KB
MD5715b773374120a21ba36fd641fb15277
SHA12c7d08804de8b4f4b4a4e42d62ff163e749694c5
SHA2562a56f333231c01b24044cb0b6f9d575cf2444afdd14911369ab884281797611f
SHA512ffa207ebe401d557ef5ca2654e532543e104d6479cd525e48650e911047040593f490df01b0b25de2d77c0be25ee44b3646551a9fa560834bc97ed5c5a2f14e8
-
Filesize
135KB
MD50176683043ae3c0f0d4c8de47b4f6161
SHA155b2a26aeacc2ce992115edfad100259764e55c4
SHA2567f0d312dbdfce2d89c08936f469dd8376c68710eab96c2975165734825669588
SHA512aa83a0353535b3965bf608c6b64e449fa3c3c2c79408f98b245e4e7cfa87ea148ffe7890356429968bc2e706fc1acc32a8673baf0cfeae0607ea77cfe87611de
-
Filesize
135KB
MD5c770f3c12a3da427c04f41d83e0bcdb1
SHA1dfa5a441300372c4c368ffe7a6d87488aecc863f
SHA2566035ec1861b8c8d12454936fbf17670974fc91c7c2465f163865356d0401a323
SHA51249c2588f4ef7ebf1dd79097f567dff289375449cd03d9d6f380f3fdcebce6687cfe39844b9291d2c32f1f8ab2c7e745297d2356c94816ec14cf34b4a3dedb84c
-
Filesize
135KB
MD5e4fe653ff3e576f3d096b09560607e8a
SHA10c41936e52870de67a818fa3b3984e60795258d2
SHA256bbaf72823690f2cd64f1ee31146224e8ff713edf312bab2ecefbf702aad0092d
SHA51285874383af8f461aa14959120351597d090834403b7b478b5d34447f7a4ef2fbe702428dd444554f8456bc537fb8f5c1926659d5ee795ab3132b711f8f6ec5ae