Analysis
-
max time kernel
120s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 10:06
Static task
static1
Behavioral task
behavioral1
Sample
7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe
Resource
win7-20240903-en
General
-
Target
7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe
-
Size
653KB
-
MD5
ab3fc4dce62e61a1b0c3c246e1a40a60
-
SHA1
5b2f7ef1cee65fc898e58392937a7683b9f35420
-
SHA256
7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0d
-
SHA512
b6dfb0c4e6dce823050f9d66d39a1287bdfbf97beefe828893fb8d889bdf861e510dce9301e5963eed8dac8250715680d729e686b485ace0748dc1508a2ebb5d
-
SSDEEP
12288:JTYkuB+NC7dTWJ3s0gKhdQw66zqHR7L3jwAS+QWE3PfQy75alnnEX7nuoK6HQDXc:JsB+Nytop966zqR7jUAFQWeXQy70yTP5
Malware Config
Signatures
-
Expiro family
-
Expiro payload 1 IoCs
resource yara_rule behavioral2/memory/4040-2-0x0000000001000000-0x00000000011DA000-memory.dmp family_expiro1 -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 7 IoCs
pid Process 2936 elevation_service.exe 4320 elevation_service.exe 1252 maintenanceservice.exe 2256 OSE.EXE 2748 ssh-agent.exe 5000 AgentService.exe 2564 wbengine.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-3756129449-3121373848-4276368241-1000 OSE.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-3756129449-3121373848-4276368241-1000\EnableNotifications = "0" OSE.EXE -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\mdgkfajodaliacghnafobjnclblcfmlm\1.0_0\manifest.json 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe -
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: OSE.EXE File opened (read-only) \??\J: OSE.EXE File opened (read-only) \??\N: OSE.EXE File opened (read-only) \??\Z: OSE.EXE File opened (read-only) \??\Q: 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened (read-only) \??\U: 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened (read-only) \??\X: 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened (read-only) \??\G: OSE.EXE File opened (read-only) \??\Z: 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened (read-only) \??\S: OSE.EXE File opened (read-only) \??\R: OSE.EXE File opened (read-only) \??\T: OSE.EXE File opened (read-only) \??\K: 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened (read-only) \??\M: 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened (read-only) \??\S: 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened (read-only) \??\L: OSE.EXE File opened (read-only) \??\M: OSE.EXE File opened (read-only) \??\W: OSE.EXE File opened (read-only) \??\G: 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened (read-only) \??\L: 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened (read-only) \??\E: OSE.EXE File opened (read-only) \??\P: OSE.EXE File opened (read-only) \??\Q: OSE.EXE File opened (read-only) \??\H: 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened (read-only) \??\O: OSE.EXE File opened (read-only) \??\U: OSE.EXE File opened (read-only) \??\V: OSE.EXE File opened (read-only) \??\X: OSE.EXE File opened (read-only) \??\T: 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened (read-only) \??\Y: 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened (read-only) \??\K: OSE.EXE File opened (read-only) \??\V: 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened (read-only) \??\W: 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened (read-only) \??\O: 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened (read-only) \??\Y: OSE.EXE File opened (read-only) \??\E: 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened (read-only) \??\I: 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened (read-only) \??\J: 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened (read-only) \??\N: 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened (read-only) \??\P: 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened (read-only) \??\R: 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened (read-only) \??\H: OSE.EXE -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\system32\svchost.exe OSE.EXE File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe OSE.EXE File opened for modification \??\c:\windows\system32\sensordataservice.exe OSE.EXE File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\dpehfahb.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\system32\lsass.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\system32\locator.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created \??\c:\windows\system32\bcpgfpmg.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\system32\vds.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\SysWOW64\vds.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\SysWOW64\msiexec.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\SysWOW64\sgrmbroker.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created \??\c:\windows\system32\mbijikfa.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\system32\alg.exe OSE.EXE File opened for modification \??\c:\windows\system32\dllhost.exe OSE.EXE File opened for modification \??\c:\windows\system32\searchindexer.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\tieringengineservice.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\dllhost.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\SysWOW64\perceptionsimulation\perceptionsimulationservice.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\SysWOW64\perfhost.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\system32\spectrum.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created \??\c:\windows\system32\openssh\iadfpela.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\system32\locator.exe OSE.EXE File opened for modification \??\c:\windows\system32\snmptrap.exe OSE.EXE File opened for modification \??\c:\windows\system32\vds.exe OSE.EXE File opened for modification \??\c:\windows\system32\msdtc.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\diagsvcs\diagnosticshub.standardcollector.service.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created \??\c:\windows\system32\jjfmbpfm.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe OSE.EXE File opened for modification \??\c:\windows\system32\vssvc.exe OSE.EXE File opened for modification \??\c:\windows\system32\alg.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created \??\c:\windows\SysWOW64\bliiomia.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\SysWOW64\spectrum.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created \??\c:\windows\system32\akicedlf.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created \??\c:\windows\system32\WindowsPowerShell\v1.0\phjkcefp.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\system32\svchost.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\system32\Appvclient.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\SysWOW64\sensordataservice.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\system32\snmptrap.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created \??\c:\windows\system32\binblkeh.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\system32\WindowsPowerShell\v1.0\powershell.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\system32\msiexec.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe OSE.EXE File opened for modification \??\c:\windows\syswow64\perfhost.exe OSE.EXE File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\system32\vssvc.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\system32\Agentservice.exe OSE.EXE -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\7-Zip\7z.exe OSE.EXE File opened for modification C:\Program Files\dotnet\dotnet.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\gkbpadmi.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe OSE.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe OSE.EXE File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe OSE.EXE File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe OSE.EXE File opened for modification C:\Program Files\7-Zip\7zG.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\pnhochhl.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\ejlkpjei.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\geakanpm.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe OSE.EXE File created \??\c:\program files\windows media player\naqdchah.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe OSE.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\kcndgmlj.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe OSE.EXE File opened for modification \??\c:\program files\google\chrome\Application\123.0.6312.123\elevation_service.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\nmnmmjgb.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe OSE.EXE File created C:\Program Files\7-Zip\mnclgkoo.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\hnefggen.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\bafefhom.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\iabjpiql.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\cgcganec.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\ndphlgfh.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe OSE.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe OSE.EXE File created \??\c:\program files (x86)\mozilla maintenance service\pjnqffol.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\jaemdheq.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created C:\Program Files\7-Zip\ckjgpiji.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created \??\c:\program files\common files\microsoft shared\source engine\hknqagop.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created C:\Program Files\7-Zip\bglnccaf.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\nleaigbf.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe OSE.EXE File created \??\c:\program files\google\chrome\Application\123.0.6312.123\okbdenjj.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\7-Zip\7z.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe OSE.EXE File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\jkkbiphh.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\program files\google\chrome\Application\123.0.6312.123\elevation_service.exe OSE.EXE File created C:\Program Files\7-Zip\klncjook.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\hjfbngae.tmp 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe OSE.EXE File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE 2256 OSE.EXE -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4040 7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe Token: SeAssignPrimaryTokenPrivilege 5000 AgentService.exe Token: SeBackupPrivilege 2564 wbengine.exe Token: SeRestorePrivilege 2564 wbengine.exe Token: SeSecurityPrivilege 2564 wbengine.exe Token: SeTakeOwnershipPrivilege 2256 OSE.EXE -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer OSE.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" OSE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe"C:\Users\Admin\AppData\Local\Temp\7698a39ac49d8b24acd46154c674f8cceef1fb62d193964d1dc0ce4e9b779a0dN.exe"1⤵
- Drops Chrome extension
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2936
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4320
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:1252
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2256
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:2748
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2564
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5329ab10d1d67f50d825166b8adcf8ca2
SHA11c174f048b0610333f6cb598e0cd8172d2d9e1b1
SHA2561a40c142d577bf11076adcc8916f5b8e120091f911e9952ee90657d70e328c73
SHA51282a38b0d038e0d42cffbdf28fdd039bc988c58ec726e041fa97c5906242e60ef1829422a54ad006fd879e0df5b1ff5faecbf465b425806cf09d25eb03d15c603
-
Filesize
809KB
MD596e9b4834e205a83b93b032bc464fd08
SHA1a88673e871b9fe2e34788c587b877c8a7cf149af
SHA256ba398e268caf3728471f5a5c0dad2ba0fbfc19bf358726ec1dfc5eec087a1c26
SHA5121a0d5e21fb77af630b2f363a2beb9078b5b5a159790296868f2432ef4efdce1657ff8844e1f5e6f18eb9b70da93dda5106e2beb936fc18888a749b98d880c4c1
-
Filesize
1.1MB
MD5feab1fcaddae3fc981f0822678dfd6f1
SHA15a9aefe2c7351369cbf19242b14c4f70e0f227c6
SHA2561a18f3ce1624d3a374addc368b311b5675a00bf799643341fdbe6964835350c1
SHA5126d152e3eaf4b955fe7963a786112a9e81ca81d596047fdf76044c9b568596fa50a9c2f4b355bbbff82f41973b020c6a33afa27e26cb9f8c7fb297770749ea135
-
Filesize
1.5MB
MD5b44e1faeb9e519c4db55a6015d1e2570
SHA135def54e260c1da6f6812d14dc6e16bd3ce093c4
SHA25659202a79e3a98d65e8ddf0f7806c8673aaf6d6ac45c40bc8f261f42620c66474
SHA512e8fe27a79d405f3dc468d19c79563fb07aa56a17ea083a6b4affc1f29487728aa4a43be05e1ed859326a7b44a6eb525fb1aee5b15525c7070a650b93f16b62d8
-
Filesize
1.2MB
MD52ea6c281a3789a3e4b671ee19e7d71b0
SHA1db00d4f0acfe12bfc7f301cdb36db00c9959ecf0
SHA25670bb3c703884e1534c3306662f0fe4a9d5e6f47455b5f229b30823d94562efe6
SHA512f851e3352415c2fc18b414314ed67e77d389ba7fd61594a67499aec72ed83b398452e5b696997b0974df4ca9d1c57d6742d6cde8bfadd37b98c004a13efd7ff5
-
Filesize
598KB
MD5522fc6a6bad238e46deb8021f49488eb
SHA104aa24581c591947741b8d97bee2e2176ef94949
SHA25612327c2da5bda290b9ffa7b69795157e4580b18a08ead34fba55419601dead0e
SHA5120312f4310a621a19b17bd2e3ab3b7bcaf94c37ade15b25cfefce9ba44837c9ee9c722562321870199003cc45abc0f8c647e028dd55236cc6566d3edab332e91e
-
Filesize
860KB
MD5454381fabbf85139ad747f0cedb27db4
SHA1a1a58b05ebf8e41866e283a1183928d2738d0c25
SHA256919e0e5a983e3af3ba7e13ed4b3a3ef8cc2cc03e599ceb4f997834e65c0c0622
SHA51257d65f93ddea82cf7c0a44d2e15cc0ea585e783433b8386bef49e9d5e7fffdc54cac1a4463ca8115a0881f8c59e5b2b5f6b8135df82250ed1e83f67735b98c28
-
Filesize
4.7MB
MD5190e2667557cd6587aa682d061ed7330
SHA138c18679cb57f8e81c20fb53a5e64e199a2e3ad3
SHA256b4e0abef0ddd60c1950a8ac6385654847d551ca1b87d7e15e72a1155ce53e6f9
SHA5127ba7ca038c52b5f32e36c0e5f6cb4fda3312d794523d8292568b1bf818add9b4ac29d0432f4eb211ac2d3635dd04cc9e4ae320daed01756a254f7bf8454ce9ec
-
Filesize
930KB
MD5a616bf9b9da4c76f9d3e77ba9bb5c870
SHA1c7eb59bff61431d1acd7b722b2697b2b50ac1815
SHA25635c856010beb1e1b7a074742b0376b6c4a28a5f5aa04473e1b97a24012d63b30
SHA5126571929c1fd2ec183985eb3ec7c41591dddd291a42fc6d70a761c0ca19ff31cc860d070f30a75261613f623c02ea93aab10658e9344e43ecfbe779dafa368baa
-
Filesize
24.0MB
MD5510d39ce202fce96d360c996fc3489ab
SHA1b53d330541934acbce21108187200d4245aa482e
SHA256767443ed60758b39f7362bffb790aa2d4e4e259678df3858b0b201071d63f6ac
SHA512c9b80fc6629a384e666d7a5239828b928107e9400e570ea6c1636c4fb7cde31aa39eb8dbc8984c872f5ffa775194b55aedac286889ad9f4d89a8222527144e6b
-
Filesize
2.7MB
MD5600e86d22837f04490b6d756b6e7c4d4
SHA1caa61a46f9764ce4e498ba556d48961b2031c84a
SHA256f4085cb54943d0d69828e6d7e76d048d68d510215f1a8957eb265b864fe6edce
SHA5123b8cef0d932626bc0f89aea570323425336538aef19c3637ce02f7080a2bc5f24f70282a51e1b1006946e864f055eeda0aab043196ea7363e9d8fcb65c7f1bff
-
Filesize
825KB
MD5a3c74ad605cf6d47ef9d2411c6ac70b1
SHA168beed199f69835061b273fe77c16b052ff92c9b
SHA256ba1ed4a6ade0e1a9bdeba5d88aed79eb245ac8cdb95ea57b2e8c52910aec72e9
SHA51244f7814745948fb084a7a8391c36bd6cc426320f054adf16599f15a25b4ac6d2f94dae445ec0d7c177168bf6dea0a5124dc4a717aa3722d40fee27a43de8188b
-
Filesize
2.2MB
MD5c0158682f30280e966bc602eb3ca84f8
SHA1ba9c6b07d3c5a4d530ba90c07bca144ead8b32cc
SHA2569b35801f3eb5e7946cb7cf5a336a0c12b205df99cd7d0bb34a88d2f4310987a4
SHA51285ac4c83e6533b8d21db0b736a3344996b30cccce80f972a7cc04dd8959eac7c3ed616311eb905b4a822b15d6f318acc196d23c577e213882eaa8262b2615fea
-
Filesize
1010KB
MD5f99f019679ec851ae9b31ada3f23de0b
SHA1c8ed89cd1ed2e7091d6949f07d80ef482e880193
SHA25670c516b8fa3686326c8c48f0f741567c5511132322769136d4f06fde5e74fc31
SHA51288a3373a95d4b5b8a463c43d2c0086e85e2e03623b1544ab5cfcae4a1b009b34d2be9f34bbbb45eb277fa0e823cafa653aceae448fab8b43addf5dcc56726fa4
-
Filesize
1.8MB
MD5222e0493b1ba23d9db389539d5c27fbd
SHA1dc07770250e692f159df6f0a3b83ef965f8c6989
SHA2566d4e4f21b9035261081214bd2e31b7a7b359fa5511e63f5eb553189829956c4b
SHA512be5e6492c621bcafe32649401f8ca7f5384eae8b63281e8bf9e6a2b6d985c17095b19d1bc2acc0510b899ffa481f1ea74262c70d08209f919b7d51e1a385b9ff
-
Filesize
960KB
MD5f3379c35ffaac06c3eaa5cbdb436f495
SHA1c427447ca78fe3950839b652d2a414a1a571dbd6
SHA256c39a3a6a3b7762215d5e8f8a02d1567583cad4f177f5aa229ba73f121b717850
SHA5121e4dc111fbaee772c3d20e99eb7f46f49db6ac4e19a9a7f471236cb5d42cf073170e71f097d97f4f34563ec4d30101dcee2f660c22d82604e91d1b305bbefdc5
-
Filesize
1.3MB
MD51b03ebf550a0f2aeadf4f46f1ef05ccc
SHA1ea809b8c4fc833cc3318e855855707242abfd097
SHA25669b8b6bc0328cc6a55989efa1c3a8b13a6500dd078eb934b6dae36997a1b1764
SHA512b5cfd226862f1c60ce59d711e1d6b7a0498d7040342512e4a111fa5d4175a0a43c8b203ca22c5433cf88dc3e01ef09078141c9dde006d8d1f338499a0ecff176
-
Filesize
2.1MB
MD566bee37000225dca092b7ac2e8e8c747
SHA1ed54d1dd2f12006507baf73bb1af8676adaf50af
SHA2563510e20aaab2baa03562bac4a3b397c24e3f5b8b5ccc05ee92f42cb43f1c7a24
SHA5121f0d07bc998ec56acf9b981284c256cfd5603de3adda2c69f04a3b843bd506ee6869079a8c0caa82804c73795fd31ec52bbfc07273b6da6d57abc54ff75f34d4
-
Filesize
1.5MB
MD52e244fb360578c43fd326a6a36c03ef1
SHA169738f90baabd9ea1cad4352fc9b12b01c033059
SHA2562e1950beb710951bc09c83b0a2b3d8f3e4874b829e15fa2a62061c9518d747d3
SHA512f5f402ea2c8e6303edbb5443625c13bd0eb2ec2ae27807bcef17e5553e7b461bbc8b8c95029067a6667dcdb41cf6c1e707a2291c6941a32621a3f4a87fb012ca
-
Filesize
1.2MB
MD5ac4f3105cc2d1c3b17b51d9b0796d204
SHA1c225bf40e4c11ab3048adeec62336a510d4a3e75
SHA256bbf3fbaf68adf69c7d01b15be12b7aff47c8f982ad6a34fa618430c35ca91890
SHA512d580024425531172688653622c4d0df611d058dff1a61adca50ad37b5d6c1fbd2611a4c02fa6c257cf24bd1158426fe76de7eb4f63c1d64e275c79bba07f2956
-
Filesize
732KB
MD5ed554884cde2ba3a1027dd073b6c164c
SHA11eb7111557485d70627b5f9dbd1580998ed3fbf3
SHA256f1d6f384b8c78c8ad2838f9efc0c3e737c46406f457fe4613908a340998c72bf
SHA5123a65d35f91889e503b9e1362225992558f3cfc63708f347406f513de2d75b3e7533d2d5edc57f7ece273d302351a9cca1b628f23253ef07c28e2d56782ae0838
-
Filesize
655KB
MD5dd97bf61e9531806719de1c56bcdff7c
SHA1fe47afbefb620d263eb8730267c5fd5f876b4c65
SHA256fe8b5940bc411d838797187ff04f1cda129d6dc87480bacb3e1af155044af4a1
SHA5123f8be56866f0a2755b281325f0cc1a239ef2f60aa682f39e6811818961ec6b880a6c5df27cb83643a12319c512ae59b5ea97e0cec0056df226feabbba33622ea
-
Filesize
604KB
MD50186678c78d826353079b31c6f603720
SHA188052d4ebef6b1bb4eb79a8ae80fa9cb423a5ed2
SHA256c4ac0ae3bb18b445e8c55b3ec2b5ade218fde985cc9abad1afdcb4882a894da8
SHA512fe53e9d7d18bd71bbc3f2a75ef239e168983af915c5770dec5c2b9214ebe54f25cbf50b1d691a5108a37e7b01fd29dfa6adf3372194ba30fa4f2fc99a6a7a4db