Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 07:58
Static task
static1
Behavioral task
behavioral1
Sample
5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe
Resource
win7-20240903-en
General
-
Target
5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe
-
Size
1.2MB
-
MD5
2bc25cf29c07fc5f1be61c56470cb4c0
-
SHA1
3d88439b3297dbcd8703f99c24777e7ae97f8818
-
SHA256
5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aad
-
SHA512
6817e2e4fafe88ad414906cac7570e31c3130c7e346898c115d5b98384aaa4d8c30c9409bfa1c6d692e414c67610bd48aec25c94489d3e5198594c50fe0585f4
-
SSDEEP
24576:lznORZNguQDQuPUcJTHuhG+jIZOzeFXCpgz4ntnMMMMMMPPFt:kgXTH0jvqFSpgc1MMMMMMH7
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2808 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadNSrv.exe 2852 DesktopLayer.exe -
Loads dropped DLL 3 IoCs
pid Process 2788 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe 2808 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadNSrv.exe 2788 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe -
Modifies system executable filetype association 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe -
resource yara_rule behavioral1/memory/2788-3-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/files/0x000e000000012275-6.dat upx behavioral1/memory/2808-10-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2852-20-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxE927.tmp 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadNSrv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadNSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadNSrv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadNSrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440497750" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79795781-BB83-11EF-A8EF-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\ = "WinRAR 压缩文件" 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rev 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\WinRAR.exe\" \"%1\"" 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\DropHandler\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\ = "WinRAR ZIP 压缩文件" 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinRAR.exe,0" 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\WinRAR32 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\WinRAR 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell\open\command 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\WinRAR.exe\" \"%1\"" 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinRAR.exe,0" 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\DragDropHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shell 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\WinRAR32 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rev\ = "WinRAR.REV" 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\ = "RAR 恢复卷" 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR32 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\DefaultIcon 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell\open 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\DropHandler 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinRAR.exe,1" 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\DefaultIcon 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell\open 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell\open\command 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\DefaultIcon 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\WinRAR.exe\" \"%1\"" 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR32 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\DropHandler\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2852 DesktopLayer.exe 2852 DesktopLayer.exe 2852 DesktopLayer.exe 2852 DesktopLayer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2788 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2592 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2592 iexplore.exe 2592 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2808 2788 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe 31 PID 2788 wrote to memory of 2808 2788 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe 31 PID 2788 wrote to memory of 2808 2788 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe 31 PID 2788 wrote to memory of 2808 2788 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe 31 PID 2808 wrote to memory of 2852 2808 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadNSrv.exe 32 PID 2808 wrote to memory of 2852 2808 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadNSrv.exe 32 PID 2808 wrote to memory of 2852 2808 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadNSrv.exe 32 PID 2808 wrote to memory of 2852 2808 5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadNSrv.exe 32 PID 2852 wrote to memory of 2592 2852 DesktopLayer.exe 33 PID 2852 wrote to memory of 2592 2852 DesktopLayer.exe 33 PID 2852 wrote to memory of 2592 2852 DesktopLayer.exe 33 PID 2852 wrote to memory of 2592 2852 DesktopLayer.exe 33 PID 2592 wrote to memory of 2832 2592 iexplore.exe 34 PID 2592 wrote to memory of 2832 2592 iexplore.exe 34 PID 2592 wrote to memory of 2832 2592 iexplore.exe 34 PID 2592 wrote to memory of 2832 2592 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe"C:\Users\Admin\AppData\Local\Temp\5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadN.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadNSrv.exeC:\Users\Admin\AppData\Local\Temp\5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadNSrv.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2592 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56326467a57d6f1f80e91ad9739a182b5
SHA1218949e6184b806a2f3a98a4d762ac2fc63acb90
SHA25670fa01b167bdc29866dc1dac713d80429bfa2752b5f455908787180a1df6922b
SHA512b4853ed951b4435a3fa9fcc2186df132d4b5f62cd404291d71038e98e4c25c30a094d6c1e0ac3d3e6c8ff798f60958549002b38e8998e6281a66a02b059ee202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a77a9f3ef8a0f41629d884a5622902ca
SHA16c4bc3a354a88b3bd78c26462913f7d1d4f8cebd
SHA2562e685b16938d385a7029c04afa3c0c616e2accfbf836ce5ad1318d73b1aa99ea
SHA5122285e58cb6e85870cc6b580c5550fbde0721b63d6a3368b3b339da6f2ec2daeffb3ea9949111ef8731c9fb96426d7845c3f11a8c680afc07e45cfb8c98f3f01a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd2838f26f07762da4e1d987fb8b5b55
SHA1e5b5aec6b15c201997bfab039d79b06a191de7cc
SHA25698a7bd8e8bd7d1f6a02d866ddba4c6bf5aaf2950578c6c9e7f7273ddbce2b4de
SHA5122af91c3c45a06d0cf3d5f460692ee88dec831eb420905c94aa67d91ee99a277bfe6234928478f92d54ba1d266cc182bda8eaa097ed21cf048a85a3018b95f973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baf200e4039bcb940714dff6e7866e39
SHA188f9f21758777378e1c8635a0353e69f85116734
SHA2569918a6c26b1f03e2da2edf4657cc3498adc4cf26c5bfedb304d0614aee2997da
SHA51258423f3ea96047a7915b1cb499b732e4edde18b7bd1dcd849290346a5ad6ca949b381b56e438697577dd13b25d6fd1038eecfdfdfcdcb47d53c6c3515528e815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be384cc2baa6c39a59d3b17b5610b973
SHA19feca3e2e3e599cfb04cb4eb8291abdd28ea306d
SHA25647b215a950e4b12f4dd8e1417166623324f8c746cbc0f44b5a8a815c7419735b
SHA5128736e218da746d3b5b976a56f749a27cfe18ee6ffaea96ff07895b1871e22e2b943c109e4c50ce1ee6c2592da10bb44f84339afda27ef108948161711eead141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8850e47ebbd04b3a8d3f229e2f9a491
SHA14277b6f3f15104c08fa6e947fdbb90fac0529146
SHA2560941411241bedb4f566a320f93557e4eea91cfb80081cf1a9e4102611f94bcdc
SHA51291e302ff5cef4325eebdb94db99871c65964cfec6d4d41112ba9ff13e90d3440d37806793141613ffa7a606385db7f86cc224730f975f8ad4b022b133ec31fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d4e5bad07cf0284a37115f934ffdec0
SHA14297aa7cb1f4617f4abc9b0244de5b2c7a863fbd
SHA25679bf6258815715049882112d713d1bdf0c1f8159f88e9142d1eb5fd472451193
SHA5123442ba457597d31903be8fccb2d90972faa98c03fe428b2f695237f67a2512a97e79903038c404ff275db384f2df8d7adbecb223791c2fba22abd77898b21ecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5760b1449aa8ad3f4898aeeabb8ac9d38
SHA19b44868cad654b3d56b27db054c05f67eaa01c55
SHA2567311df1be601f7b6c804d6ab6e2f81632e18062e943467b60bfa07825f23a17a
SHA512277c4e7b6920257c9be14e1a4833023eec079d9ea96a73efeff26d8b4be904fae0bc579901837e2b0fef5a82a646761f194edd518a97ac2b3caf2b2c25796779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d90f442c68e27d3d43b5064c24c4a41
SHA1d201645737903920df48b9cb140c33f7090ddbc9
SHA256b139d20347d4abd077d24b8aa449845f43228a023905f0742477a897890b290d
SHA512234467c695d5d12a8d1431b865855acbea147912ff6b84ec1ddfe6957fb6562d350c6c3ac1f158dcb219d8540ae8c3c2e32e5f1d5375aa0a626f31bcea6e2463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518775d27b4b728322feffbc6e752bd90
SHA1e1cdfd2609b56117012e1f7f0e7b0e81cd447802
SHA2568faa5a85f7decc5676282b6293c3004b02e3082b13b3a081bcc9a27383e2553c
SHA51248b8dc0d13392508665eac8c8aa6219a2623bffc3925d2bb1e3a06443a26d410d39c541d23b94abc2ff4e91d7b3662d94bb5b50311f279b35a005a4a672b0c52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff7743f17b9b37c5d200ef51add1d783
SHA1a8bf49e8180ac73a5e54183e607d9f29771fbeba
SHA256adb54cfb534947e02d15433a97471bd3331efe8c5ec944a8f9894dbbedf86fd2
SHA512d4e1032a9abf811fba5e39c7b9cf9f047d6ed5a210a07116e3fa93432f1f5d46ad9ad50bc156101651e4c150d2c0171f42f489d0bc0fbeb005135c0ffea4e1c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500ced720b4be90b55dd5acf2a243d947
SHA1d7201799e98a461e987ff973b51b29803b051ee5
SHA2565e09b478ffa8d181615f193018a8422bd5924486d8c452a517f54f1dcd59d4da
SHA512ff389d072f1daabe4b5c3c500907707d2ef5984e47405156c935c1befcba79e126109d36c789c4dc6e9b4eb6f7259b586adc51bd2af902c994786511f08f3824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da877d8d8e2f66bbca71445b91cf4266
SHA1403941234f99c249bf58005ea1de2e860ecd6625
SHA256f7331a3be873c83cb665a73b565fa4d7bc486d39cb823b850acc09f098fe6b14
SHA512a3818207466188a513732e3ef3f890fb51fe8742859c29b14bd7f7c758e3296360e3737bf27bf80c567563fdc71b118c7ccc2ea817aa27baff75ffdf76969fe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564e28363a65c6ddb0db1a384f33a8048
SHA1902b572916685ceeb4508c07d8209fd6bc971788
SHA256be2bafee3c032a0dfa3de37aa9ceeda030c1ca1777fa2c29820027454489d1b8
SHA512109aea512ff70aa034a848cd52b1a1b258a71363642cf5804fc15c01d6376cb2af4ba2a34677fe036b6e214d8269878dda65231abd71353e269c898ff492e714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513379bd45f212db849116dece1c1a158
SHA1df4d3432401933d793e2692d5eb0770a78a976e0
SHA256ae8f57da363de895ededa5ac8777f14de60ecf9de2c464eff3cbedcaab3d4b98
SHA512232d8fcb147e5a8e9a5d2e613b88a3b45cfb42d724ac9754f4a93c637806b8cd7a2b1c91e99d1c22cec636feb92f2f0a23d184af4429dac7d8aa2a1dfa5d0f45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb95f35b99a47cffffe862ea2ce246bb
SHA1fdd93a3531d89598f29c702447230a59d422d1b7
SHA256ae3b976245459aec5537e482b965af2a7428b4e85b090c4af94623262712f9f3
SHA5124045219cc9a15b0d536f6e7bec5ee30021a3ac44e7e0d53ba6fa33ca69fe1ee0a7872c4c7090d41c87a10043f97f9a29da238eec218e697008f74c33c05d5441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50937178e56f5cd42773fd48564c4a647
SHA16df743458cab1abca314c71d47d3d324d398d46c
SHA256e451116d6252f161a0d84fbffa2197922f51574f7ffd8695af5e7f65d4e12b34
SHA512ff73e0035a2655a4155cbe5c4845df8e1b76b64f33cdcad01278b3981c211682887b466e9b99a7b1281fc92a1f37aafba7e189f7832dfed7f5be7fc5e5ef2802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c75d13d7ec72739aae5fce46c4748dbe
SHA138b1297dd039bfa935796563b4a7811804663ff4
SHA25647cf0be0f9aa91bdee22a4e92b7dcbb1ea329d209f02d948a2bf0af4d69cf664
SHA512160210be4dd7ad61f4f2acd47e51686debcc934e010b4481f27441e83e6c3e113c11fe29aed00de6765ac12632ec232c0aa1f650bcf285b6868949e3d3068582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c91687be490557681d7197d8ea4cb5eb
SHA110dcf87fe46b236335e953459ca7b3b76dac62d7
SHA25644dc44f7dd83daaa9483847f0cfd2a7444007b0fa53f378a54e838719a649d99
SHA512f130464fbed7c3897bbf137e9d89e938430630c1c07c07607f13e224dddc1d1db79979239c8645a643350a062b9f62b448cdcd09b96c3c1822ad72a27b45ea58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d1f1ca8dd2e991c9691d9087cd7dfab
SHA1253b751966e4d448335549a9b6445650244d6179
SHA2566cd960731fcc668ba3ad3ff11d1a801a5b64ade5d59112fa44b0aa41259a014b
SHA512d4aba3a6bd49eceebec1c680b237b613fac9fc126cb722650cbc9f14707fcb69d3c4656a10fc64b130aea795d8ff6d7cb4227abe34c25e614539e3980c1d1bfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f828643e1bc9d20a2976d65778fb6fcb
SHA1d2fc990478ca6b14500e6e567d63b66085ab2922
SHA2569ee0e540000e7c38dfe3bcb064b5358d5ccd2571fda5a026b7b56403f60df2cc
SHA512d4cc9903b792ac32e70b2e66ddc1fd3159724eef3186ea8c2a9f426657dc04f0bae4ca2c8751aaed886b6e891e8cd9af9e49e740a29dd43b3e72587384ac4cc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c76151e35fe31ccc583bcf4aed98cfb
SHA11fdf53c1ec76903bde1d83e3228855241d1a33b3
SHA25625735fda31f9c99813aff0257059458b0b83f59bfee1ba991b9d0423dd6aaeae
SHA512d1dca92436a15eb903cd003d68a816d8bb13ecd8898f96599acce36dc8635d46cb0b8646ca89819bd9c0052db3f431183a03ce5d30bf1f9344fc21cdb2caab6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb62377fbb04050788ac81d6d71bb271
SHA1bf29f0b56ea20b82432702e177586fde9debd4d3
SHA256e2ff5fa02b409159eb9d735f3c03e7e3ff514e0dae302ca9c7d53331752cad3b
SHA512bbb24b05235aab0a7cf463db57fb68ec438efc261f19a4919971c6ed09c88d617e3af0013132d64f4f2f4a7cf91ee80b83f8ddc3b8d8edf8adac4facae20ad00
-
C:\Users\Admin\AppData\Local\Temp\5bcbca40264f7463c4658866d91e1637ad611226796b7f33f7845b98e3032aadNSrv.exe
Filesize55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b