Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 03:38
Behavioral task
behavioral1
Sample
c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe
Resource
win7-20240903-en
General
-
Target
c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe
-
Size
2.5MB
-
MD5
642a17854f3d6bfba19c14fe37d4330e
-
SHA1
3bfefe6bf91fe3743b64ca4fe643bf8c347e83c5
-
SHA256
c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93
-
SHA512
d1b9bcd7f187763e308db2a18222bab10acd070afbe766d6231c2d34cf78e7716d0666a8dc1d986e74f8d93bdd6ede205fb472917de1398f8763adcb78a89db9
-
SSDEEP
49152:S+ggKOb+Hqoo3gU9DPjOP+9Rq1S78JgxVJ9y9EvpoWoGODTPnAlm26TKY5:Dg2KK3z9OP+9Rqc7zJy9QoLalc
Malware Config
Extracted
gozi
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral1/memory/2500-340-0x0000000000400000-0x0000000000617000-memory.dmp family_blackmoon behavioral1/memory/2500-744-0x0000000000400000-0x0000000000617000-memory.dmp family_blackmoon -
Gozi family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe -
Xmrig family
-
XMRig Miner payload 17 IoCs
resource yara_rule behavioral1/files/0x0008000000015d64-7.dat xmrig behavioral1/memory/2500-340-0x0000000000400000-0x0000000000617000-memory.dmp xmrig behavioral1/memory/2056-345-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2056-385-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2500-744-0x0000000000400000-0x0000000000617000-memory.dmp xmrig behavioral1/memory/2056-745-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2056-746-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2056-747-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2056-748-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2056-749-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2056-750-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2056-751-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2056-752-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2056-753-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2056-754-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2056-755-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2056-756-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe" c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Tray.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe" c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZhuDongFangYu.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZhuDongFangYu.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe" c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQPCTray.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe" c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Tray.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe" c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe" c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQPCTray.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe -
Executes dropped EXE 1 IoCs
pid Process 2056 svchost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe" c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\fltMC.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\msra.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\rasphone.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\IME\IMEJP10\IMJPDADM.EXE c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\bthudtask.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\mobsync.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\tzutil.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\IME\IMEJP10\IMJPMGR.EXE c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\whoami.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\doskey.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\eventcreate.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\mountvol.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\odbcad32.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\sdbinst.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\typeperf.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\wecutil.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\IME\shared\IMEPADSV.EXE c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\choice.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\fontview.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\gpresult.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\bootcfg.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\certreq.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\net1.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\timeout.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\TsWpfWrp.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\userinit.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\mode.com c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\mtstocom.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\dvdupgrd.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\DWWIN.EXE c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\fc.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\forfiles.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\icardagt.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\Magnify.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\makecab.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\shrpubw.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\TapiUnattend.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\TSTheme.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\WPDShextAutoplay.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\migwiz\MigSetup.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\ssText3d.scr c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\ReAgentc.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\dvdplay.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\rrinstaller.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\SystemPropertiesProtection.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\winver.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\convert.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\PING.EXE c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\upnpcont.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\subst.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\cleanmgr.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\control.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\drvinst.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\print.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\regedt32.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\RpcPing.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\SetIEInstalledDate.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\WerFault.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\wuapp.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\WerFaultSecure.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\wscript.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\wbem\WMIC.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\cliconfg.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\SysWOW64\iscsicli.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe -
resource yara_rule behavioral1/memory/2500-0-0x0000000000400000-0x0000000000617000-memory.dmp upx behavioral1/files/0x0001000000011c9e-12.dat upx behavioral1/memory/2500-340-0x0000000000400000-0x0000000000617000-memory.dmp upx behavioral1/memory/2500-744-0x0000000000400000-0x0000000000617000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Windows Journal\Journal.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\about.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\clock.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsViewTemplate.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\settings.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\settings.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files\Windows Media Player\wmpnscfg.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\OSPPREARM.EXE c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files (x86)\Windows Media Player\wmlaunch.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\picturePuzzle.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\settings.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\clock.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\SmartTagInstall.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\about.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\settings.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\currency.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsDoNotTrust.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Green Bubbles.htm c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Stars.htm c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\SEAMARBL.HTM c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files (x86)\Internet Explorer\ExtExport.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SETLANG.EXE c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files (x86)\Windows Media Player\wmpconfig.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\license.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\vlm.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\currency.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\weather.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files\Windows Defender\MSASCui.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files (x86)\Windows Media Player\WMPDMC.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsPrintTemplate.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\epl-v10.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\epl-v10.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\weather.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\weather.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Oarpmany.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsImageTemplate.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\clock.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\calendar.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\settings.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.htm c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\calendar.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\license.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\slideShow.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\PINELUMB.HTM c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{C10A79F8-2372-49E3-801D-73DDEB38AD5B}\chrome_installer.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\winsxs\amd64_microsoft-windows-grpconv_31bf3856ad364e35_6.1.7600.16385_none_fe7d1685575edfa6\grpconv.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_netfx-csharp_compiler_csc_b03f5f7f11d50a3a_6.1.7600.16385_none_8b52bb03d4ea5d36\csc.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_es-es_b8490213a810a8a5\401-1.htm c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_it-it_45286e597214a485\404-15.htm c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_e74ded66652fb660\403-5.htm c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\x86_microsoft-windows-fsutil_31bf3856ad364e35_6.1.7600.16385_none_cc3a6a9c514031a2\fsutil.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_de-de_0f8ccf36b90bab3b\404-10.htm c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_5b0078129ae2bf07\404-11.htm c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_it-it_45286e597214a485\500.htm c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\x86_microsoft-windows-taskmgr_31bf3856ad364e35_6.1.7601.17514_none_16699919077609d2\taskmgr.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_it-it_45286e597214a485\500-17.htm c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\MSBuild\f4a88265ac4ad47978daef8c5482fd30\MSBuild.ni.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\jsc.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-w..ommand-line-utility_31bf3856ad364e35_6.1.7600.16385_none_fd9ec705e687f8c2\WMIC.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\Backup\wow64_microsoft-windows-coreusermodepnp_31bf3856ad364e35_6.1.7601.17514_none_df7c5af777ec4541_drvinst.exe_6593e92a c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..s-weather.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_c1ab456ba37238a2\settings.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\Microsoft.NET\Framework\v3.5\WFServicesReg.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-rasclienttools_31bf3856ad364e35_6.1.7600.16385_none_cb3bc16fc2624947\rasphone.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\Backup\wow64_microsoft-windows-netbt_31bf3856ad364e35_6.1.7601.17514_none_c8df7823424473a1_netbtugc.exe_825f4f74 c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedfoldersui_31bf3856ad364e35_6.1.7600.16385_none_b7f38afb92de484f\shrpubw.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-tabletpc-journal_31bf3856ad364e35_6.1.7601.17514_none_75d78dc0bb37c026\Journal.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..edsgadget.resources_31bf3856ad364e35_6.1.7600.16385_it-it_13dfc4b03a7d762c\settings.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_netfx-ldr64_exe_31bf3856ad364e35_6.1.7600.16385_none_f98e4869675ab367\Ldr64.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\x86_microsoft-windows-diantz_31bf3856ad364e35_6.1.7600.16385_none_a69c6a8f23f521f3\diantz.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_en-us_b87da52fa7e9b700\403-15.htm c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-displayswitch_31bf3856ad364e35_6.1.7600.16385_none_48b6a2a03e2c7b21\DisplaySwitch.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\wow64_microsoft-windows-rasconnectionmanager_31bf3856ad364e35_6.1.7601.17514_none_c79aef32ab85d92b\cmstp.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\x86_microsoft-windows-es-authentication_31bf3856ad364e35_6.1.7600.16385_none_419312c477ec702a\EhStorAuthn.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-msmq-triggers-service_31bf3856ad364e35_6.1.7601.17514_none_864c8948d3a4b9f3\mqtgsvc.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Windows\winsxs\amd64_microsoft-windows-s..inboxgames-freecell_31bf3856ad364e35_6.1.7600.16385_none_b466b741b68bd29a\FreeCell.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-wusa_31bf3856ad364e35_6.1.7601.17514_none_0b2696ec2f3c656d\wusa.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\x86_microsoft-windows-mail-app_31bf3856ad364e35_6.1.7601.17514_none_f35f9773adf74c06\Garden.htm c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_e74ded66652fb660\404-10.htm c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p..ting-lprportmonitor_31bf3856ad364e35_6.1.7601.17514_none_1229a6f0546e2346\lpr.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-s..mpropertieshardware_31bf3856ad364e35_6.1.7600.16385_none_9cef76e6ecab612f\SystemPropertiesHardware.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..-currency.resources_31bf3856ad364e35_6.1.7600.16385_it-it_ba2212be09f75c28\currency.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winhlp32.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\x86_microsoft-windows-servicingstack_31bf3856ad364e35_6.1.7601.17514_none_0b66cb34258c936f\poqexec.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\x86_microsoft-windows-tcpip-utility_31bf3856ad364e35_6.1.7601.17514_none_34ce5d95ad203bbe\ROUTE.EXE c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..ets-clock.resources_31bf3856ad364e35_6.1.7600.16385_de-de_330b92f4e4356a4b\settings.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..edsgadget.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_cd9932e5aaee1f78\flyout.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-ie-ielowutil_31bf3856ad364e35_11.2.9600.16428_none_e8cd1f348648ebd1\ielowutil.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-format_31bf3856ad364e35_6.1.7600.16385_none_827dd459a3aa9980\format.com c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-e..ebargadgetresources_31bf3856ad364e35_6.1.7600.16385_none_88767a95b8bbf001\flyout.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..howgadget.resources_31bf3856ad364e35_6.1.7600.16385_es-es_c9675951dd42e377\settings.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-waitfor_31bf3856ad364e35_6.1.7600.16385_none_125aa78894e49f8f\waitfor.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\HelpPane.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-mapi_31bf3856ad364e35_6.1.7601.17514_none_097346be305f3966\fixmapi.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..ets-clock.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_0accb12490597570\clock.html c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\x86_microsoft-windows-os-kernel_31bf3856ad364e35_6.1.7601.17727_none_6e30004a126a8db7\ntoskrnl.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_en-us_b87da52fa7e9b700\404-14.htm c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-coreusermodepnp_31bf3856ad364e35_6.1.7601.17514_none_d527b0a5438b8346\drvinst.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-tabletpc-inputpanel_31bf3856ad364e35_6.1.7601.17514_none_6fb51b358e21d75f\TabTip.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_5b0078129ae2bf07\404-4.htm c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\Installer\{90140000-0011-0000-0000-0000000FF1CE}\accicons.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-m..-management-console_31bf3856ad364e35_6.1.7600.16385_none_6b683cb78f534561\mmc.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-mediaplayer-logagent_31bf3856ad364e35_6.1.7600.16385_none_47357ddedbb9dec6\logagent.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_de-de_0f8ccf36b90bab3b\404-13.htm c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-ehome-devices-mcrmgr_31bf3856ad364e35_6.1.7600.16385_none_901eda10f3ab38d2\McrMgr.exe c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_it-it_45286e597214a485\404-2.htm c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_it-it_45286e597214a485\500-16.htm c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2500 c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe Token: 33 2500 c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe Token: SeIncBasePriorityPrivilege 2500 c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe Token: SeIncBasePriorityPrivilege 2056 svchost.exe Token: SeLockMemoryPrivilege 2056 svchost.exe Token: SeLockMemoryPrivilege 2056 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2500 c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2056 2500 c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe 30 PID 2500 wrote to memory of 2056 2500 c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe 30 PID 2500 wrote to memory of 2056 2500 c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe 30 PID 2500 wrote to memory of 2056 2500 c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe 30 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe"C:\Users\Admin\AppData\Local\Temp\c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe"1⤵
- UAC bypass
- Event Triggered Execution: Image File Execution Options Injection
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2500 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD50e854ec0b593fb5938748389a2fb2b2f
SHA12dc2646ad0b4040a57e519ab2f18fb27d9d69e14
SHA256db6deb369700ac5f3b65c980a9687d88e09e2fc53c7b59bbaf62c209ac05527d
SHA51288878b9123c7bd8d66354724c61c8bcdb9f1898efc5af46002cfcc0b44b48ba5c8a498583c7dcaf0dbc8b6e31e9397ef9c88948377954f68f57bc23309c0f1aa
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\epl-v10.html
Filesize16KB
MD5ed1191da9c4f74a60d695a25686f374e
SHA13a427657c16a716be332587425101653c25221d0
SHA256ab8cafd1958c27d70adc747259495e35592f8a06ae00969964f5f34f72896f3f
SHA51268098c1342f87939b3f57cd3e3a799ff316d2f1eb5c52f8d9c0c9e7c214281bff68a1260a91527b7175ad031798f42125cf9ee2e0d49772eb03b5836b67d9fbf
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\license.html
Filesize6KB
MD5657eb3527d651515f97b960a67d19fda
SHA127404b587183bc2f3b3b6919fbb91892f505b60d
SHA256f301745232a72d84f277980ad53b65d94b02479369e8b73fe0e6717adcf11a35
SHA5121085550a8844de081a216bd864990e56fbe91498fb6186cce435173ab73e29932e7b8182078cd2876039addbdb7e3c9769d7d7923f7ed2a5422e6a2a36321b70
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\epl-v10.html
Filesize12KB
MD5cdea5d1cccee27144519c75bcf3015bd
SHA1c36862abb1ada006b3dd4c28adc8b393a92fd325
SHA2561184f2316c36648a2d457b602c713d5d5eb980e86e5e8ed388e94a47f8573dbd
SHA5125d0ea1cef2af7111098c19578c42bfdfd7bb00ec3259fe026df6dd867a24f9a94f3299b035235e3cb87b1c9010f0d1be434a08318dae0412e03ecfdb439edfe9
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\license.html
Filesize9KB
MD5bc3e199345ad8ba54e2fe4acad95433d
SHA1c93cb69c27e1c03069de3c952534a52f391e3fb9
SHA256462c197c83ee3d677b07fe000b2c4e64ac4be4ceaaea80c1c77a5e67d832edd8
SHA512c1941c9106ff0d665dfee1888afcdc3c54e4db8fdb11e3313cd92a147a1084264dba8f1f9cbac5216d3c5ce1f97ff7f8d7d7493826ec3538d5db57a933fe32e4
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\about.html
Filesize14KB
MD559e4add1732aef6b8e228ecfb880c299
SHA131a6380e878f89ec9d2c83716fe42faafdd828db
SHA256089aaccbf4c17d2a0163f13820e926f8ce3122c9ed87e7e040a77439795b8fc4
SHA512461240638f98f92a0df94a6a76470d7ed3a9bf45f845b545ff37355efd4fb3efdbe592e563b6624d2e42374a3bf7682a572c3bfd96c21be87fc96ec3b3bcfbaf
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\about.html
Filesize16KB
MD526986f79440b7a706b65724e509f009f
SHA19d8ff0beef1c19fbecd28e3f632101acf3d02599
SHA256e59b7fa34b947d5ada478ff17543204251955052fdace284e5a285bd2abec5d1
SHA5122c240c4f7b8912bd5049bef22c2507c7c1af15432c860549d0f1ea35f03183270eb7315607fdf35be86703a61ec0ed7801e9e6ea627a026dbf93d98ff11d2ed6
-
Filesize
1KB
MD588c5c5706d2e237422eda18490dc6a59
SHA1bb8d12375f6b995301e756de2ef4fa3a3f6efd39
SHA2564756a234ed3d61fe187d9b6140792e54e7b757545edff82df594a507e528ed8e
SHA512a417270a0d46de5bb06a621c0383c893042a506524713f89ba55567df6e5c3ac8b198bce5a0300ec6e716897bb53fd3e8289a51240157dc743004517673d4ab7
-
Filesize
833KB
MD54a87a4d6677558706db4afaeeeb58d20
SHA17738dc6a459f8415f0265d36c626b48202cd6764
SHA25608b55f9b7dafc53dfc43f7f70cdd7048d231767745b76dc4474370fb323d7ae7
SHA512bedd8ed4975df3fcd4a0f575d6f38e3841e7a4b771baac4f72033102a070818b8539eb101c50563d89d4f3454899a1cedb33047b02e421256dedf9aaf258b594
-
Filesize
81KB
MD59acea5b4511915fbc81debeae62f616c
SHA1117308806a0cac7792236a8997b6aa8bf7f1a8e5
SHA256219841a6d7a5a76c02648404d5a61b3b2c95fd5de5abcea20d1abff2b454e23d
SHA5125f20ed86d89bf7ce1743ee7ffd56c0153ba3aa0979914337467a4321542709f4862d990735651acfd91bf83b82454463677f840197947b4ba3a13bd63a9cc241