Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10AntiPubs D...er.exe
windows7-x64
10AntiPubs D...er.exe
windows10-2004-x64
10AntiPubs D...er.exe
windows7-x64
3AntiPubs D...er.exe
windows10-2004-x64
3AntiPubs D...ol.dll
windows7-x64
1AntiPubs D...ol.dll
windows10-2004-x64
1AntiPubs D...er.dll
windows7-x64
1AntiPubs D...er.dll
windows10-2004-x64
1AntiPubs D...rk.dll
windows7-x64
1AntiPubs D...rk.dll
windows10-2004-x64
1AntiPubs D...ib.dll
windows7-x64
1AntiPubs D...ib.dll
windows10-2004-x64
1AntiPubs D...on.dll
windows7-x64
1AntiPubs D...on.dll
windows10-2004-x64
1AntiPubs D...er.exe
windows7-x64
10AntiPubs D...er.exe
windows10-2004-x64
10AntiPubs D...F6.dll
windows7-x64
1AntiPubs D...F6.dll
windows10-2004-x64
1AntiPubs D...nq.dll
windows7-x64
1AntiPubs D...nq.dll
windows10-2004-x64
1AntiPubs D...te.dll
windows7-x64
1AntiPubs D...te.dll
windows10-2004-x64
1AntiPubs D...te.exe
windows7-x64
10AntiPubs D...te.exe
windows10-2004-x64
10AntiPubs D...ar.dll
windows7-x64
1AntiPubs D...ar.dll
windows10-2004-x64
1AntiPubs D...er.exe
windows7-x64
3AntiPubs D...er.exe
windows10-2004-x64
3AntiPubs D...op.dll
windows7-x64
1AntiPubs D...op.dll
windows10-2004-x64
1AntiPubs D...op.dll
windows7-x64
3AntiPubs D...op.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2024, 12:23
Behavioral task
behavioral1
Sample
AntiPubs Dork Searcher EZ/._cache_Searcher.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
AntiPubs Dork Searcher EZ/._cache_Searcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
AntiPubs Dork Searcher EZ/._cache_searcher.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
AntiPubs Dork Searcher EZ/._cache_searcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
AntiPubs Dork Searcher EZ/Control.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
AntiPubs Dork Searcher EZ/Control.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
AntiPubs Dork Searcher EZ/EntityFramework.SqlServer.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
AntiPubs Dork Searcher EZ/EntityFramework.SqlServer.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
AntiPubs Dork Searcher EZ/EntityFramework.dll
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
AntiPubs Dork Searcher EZ/EntityFramework.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
AntiPubs Dork Searcher EZ/Interop.WMPLib.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
AntiPubs Dork Searcher EZ/Interop.WMPLib.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
AntiPubs Dork Searcher EZ/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
AntiPubs Dork Searcher EZ/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
AntiPubs Dork Searcher EZ/Searcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
AntiPubs Dork Searcher EZ/Searcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.EF6.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.EF6.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.Linq.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.Linq.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
AntiPubs Dork Searcher EZ/Update.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
AntiPubs Dork Searcher EZ/Update.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
AntiPubs Dork Searcher EZ/War.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
AntiPubs Dork Searcher EZ/War.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
AntiPubs Dork Searcher EZ/searcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
AntiPubs Dork Searcher EZ/searcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
AntiPubs Dork Searcher EZ/x64/SQLite.Interop.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
AntiPubs Dork Searcher EZ/x64/SQLite.Interop.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
AntiPubs Dork Searcher EZ/x86/SQLite.Interop.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
AntiPubs Dork Searcher EZ/x86/SQLite.Interop.dll
Resource
win10v2004-20241007-en
General
-
Target
AntiPubs Dork Searcher EZ/Update.exe
-
Size
893KB
-
MD5
f0f73959988dd4d41de1445fb9075b6f
-
SHA1
a39d5fe0e269c062c1b7c64be09db16508f6cc4b
-
SHA256
f7c2e8367293c26805ea8f0efed61aba293a970eeab7883b7c40619499e4fc85
-
SHA512
bff75fa90f703faf4682061bdd609844d98d64b07b0109091f7c2983e4e1459a702e30a4ee06aa036c0e6bc7a508f39a0c6b95a2c27d25df343b4137deb0520c
-
SSDEEP
12288:UMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V94vFUNDasQ:UnsJ39LyjbJkQFMhmC+6GD9AFOaP
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation Update.exe -
Executes dropped EXE 12 IoCs
pid Process 2044 ._cache_Update.exe 2424 Synaptics.exe 4988 ._cache_update.exe 4992 icsys.icn.exe 5052 explorer.exe 4104 spoolsv.exe 5080 svchost.exe 2788 spoolsv.exe 2252 ._cache_Synaptics.exe 1600 ._cache_synaptics.exe 2128 icsys.icn.exe 4820 explorer.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe ._cache_Synaptics.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe ._cache_Update.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4276 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 2044 ._cache_Update.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 4992 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 5052 explorer.exe 5080 svchost.exe -
Suspicious use of SetWindowsHookEx 26 IoCs
pid Process 2044 ._cache_Update.exe 2044 ._cache_Update.exe 4992 icsys.icn.exe 4992 icsys.icn.exe 5052 explorer.exe 5052 explorer.exe 4104 spoolsv.exe 4104 spoolsv.exe 5080 svchost.exe 5080 svchost.exe 2788 spoolsv.exe 2788 spoolsv.exe 2252 ._cache_Synaptics.exe 2252 ._cache_Synaptics.exe 2128 icsys.icn.exe 2128 icsys.icn.exe 4820 explorer.exe 4820 explorer.exe 4276 EXCEL.EXE 4276 EXCEL.EXE 4276 EXCEL.EXE 4276 EXCEL.EXE 4276 EXCEL.EXE 4276 EXCEL.EXE 4276 EXCEL.EXE 4276 EXCEL.EXE -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4976 wrote to memory of 2044 4976 Update.exe 82 PID 4976 wrote to memory of 2044 4976 Update.exe 82 PID 4976 wrote to memory of 2044 4976 Update.exe 82 PID 4976 wrote to memory of 2424 4976 Update.exe 83 PID 4976 wrote to memory of 2424 4976 Update.exe 83 PID 4976 wrote to memory of 2424 4976 Update.exe 83 PID 2044 wrote to memory of 4988 2044 ._cache_Update.exe 84 PID 2044 wrote to memory of 4988 2044 ._cache_Update.exe 84 PID 2044 wrote to memory of 4988 2044 ._cache_Update.exe 84 PID 2044 wrote to memory of 4992 2044 ._cache_Update.exe 86 PID 2044 wrote to memory of 4992 2044 ._cache_Update.exe 86 PID 2044 wrote to memory of 4992 2044 ._cache_Update.exe 86 PID 4992 wrote to memory of 5052 4992 icsys.icn.exe 87 PID 4992 wrote to memory of 5052 4992 icsys.icn.exe 87 PID 4992 wrote to memory of 5052 4992 icsys.icn.exe 87 PID 5052 wrote to memory of 4104 5052 explorer.exe 88 PID 5052 wrote to memory of 4104 5052 explorer.exe 88 PID 5052 wrote to memory of 4104 5052 explorer.exe 88 PID 4104 wrote to memory of 5080 4104 spoolsv.exe 89 PID 4104 wrote to memory of 5080 4104 spoolsv.exe 89 PID 4104 wrote to memory of 5080 4104 spoolsv.exe 89 PID 5080 wrote to memory of 2788 5080 svchost.exe 90 PID 5080 wrote to memory of 2788 5080 svchost.exe 90 PID 5080 wrote to memory of 2788 5080 svchost.exe 90 PID 2424 wrote to memory of 2252 2424 Synaptics.exe 91 PID 2424 wrote to memory of 2252 2424 Synaptics.exe 91 PID 2424 wrote to memory of 2252 2424 Synaptics.exe 91 PID 2252 wrote to memory of 1600 2252 ._cache_Synaptics.exe 93 PID 2252 wrote to memory of 1600 2252 ._cache_Synaptics.exe 93 PID 2252 wrote to memory of 1600 2252 ._cache_Synaptics.exe 93 PID 2252 wrote to memory of 2128 2252 ._cache_Synaptics.exe 95 PID 2252 wrote to memory of 2128 2252 ._cache_Synaptics.exe 95 PID 2252 wrote to memory of 2128 2252 ._cache_Synaptics.exe 95 PID 2128 wrote to memory of 4820 2128 icsys.icn.exe 96 PID 2128 wrote to memory of 4820 2128 icsys.icn.exe 96 PID 2128 wrote to memory of 4820 2128 icsys.icn.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\Update.exe"C:\Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\Update.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\._cache_Update.exe"C:\Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\._cache_Update.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
\??\c:\users\admin\appdata\local\temp\antipubs dork searcher ez\._cache_update.exe"c:\users\admin\appdata\local\temp\antipubs dork searcher ez\._cache_update.exe "3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4988
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4992 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5052 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4104 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe6⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5080 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2788
-
-
-
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
\??\c:\users\admin\appdata\local\temp\antipubs dork searcher ez\._cache_synaptics.exe"c:\users\admin\appdata\local\temp\antipubs dork searcher ez\._cache_synaptics.exe " InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1600
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4820
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4276
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
893KB
MD5f0f73959988dd4d41de1445fb9075b6f
SHA1a39d5fe0e269c062c1b7c64be09db16508f6cc4b
SHA256f7c2e8367293c26805ea8f0efed61aba293a970eeab7883b7c40619499e4fc85
SHA512bff75fa90f703faf4682061bdd609844d98d64b07b0109091f7c2983e4e1459a702e30a4ee06aa036c0e6bc7a508f39a0c6b95a2c27d25df343b4137deb0520c
-
Filesize
21KB
MD55a1f79939664d0b8f08f274f294017ac
SHA11ad03087f1eb02d7f8a6a82168f3f381547ab989
SHA256cd71bb771b62592fd93f79e827bcbcbadf3b3ddf67eebac7af90c9a69965cac6
SHA512029aeec056de496fb26bd57d33709b58981fbacd0853031fbf58e4168e9f85040787c1ca101e19a85faa2aabd6edf80fde1566e6a73178c4d4e403926c5ba8d6
-
Filesize
140KB
MD5570ddad76b94dd6156587b6f98ce8f6d
SHA1c4b4b2655cc181add7a1e90d840a6735ca4bbace
SHA256324fd9c87d5311ad7ab72f6238afda44f7bd7532daaf2a3d639a4dea81d95c86
SHA512be0be9826d2e6dcb0f3bcbe16ef624154f6357892d4c57d8d1f87508cb3d1b37966d1ceb679487305ea3236acdcd5871a6cda315a89510264850b0629e36aa0f
-
Filesize
5KB
MD5e2032456744fd06c43c2097f8fcd1a1f
SHA1df474bbbd27166ef9a935457c44130fa20fbda5d
SHA256bf9ba9e515c43c1c7d394cbc528e2fa500d98c423df89958485f61d2bd7bb874
SHA512e3520f05508bcd44d989b7e92102586235a1187afbea8e9d903244e5487679190fc83aaf831ded2b9e0da0803b3298c93ff1be0396bbe54e57b5c3a428c6d7ae
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
135KB
MD5396d11a99266c10b4d6b984cfbfaff7e
SHA18f9c3aed2d92b3773d28f8b9f79f6a47197185aa
SHA2565322aafa38db442e2c8911ce69c1fec5ab8a7dfab31114de275fa9c46f9d4e5b
SHA512726bd4b84cb22a414821dd59fc553ba5c3208d26ccccba272767343d3a3c4473c27fc8e7e2a75f4c6298fcf49df64e60f81c437f6cfc4a085a4643b1ebf79659
-
Filesize
135KB
MD5fe07e43d610bef7a346eef8f8c5b9a95
SHA1f782e9115af0f9cd8f5d88179476614fd84e1a10
SHA25683caed8278b264c26235d659bf80924ba0969a6209d984cf6a38ac66635af4d3
SHA5122e1539602e62dc13a303f71760a4ed6a155daae438804d5bde7f6ff9aa67818e66ada7eea2fa1eff76144513695e91783f481f5fe7ef1c56dfe15251033c2f65
-
Filesize
135KB
MD5852e686eaa7253515d3a680c0214e44b
SHA15fde61b0cd977d1fdf4db42425d343536f0233d7
SHA256a686365c3d144b34f34f168b07de3f90f5a798fbc8cf644e087e81f7f88c9b65
SHA512ea9e68d93eee963d435d174cef2fc524c42038f9e264fc9f1ef2c34f35691797155f47c0e79b6a2ae9570c2a7abb830b46463a219ce9914dda68ac416bcf2528
-
Filesize
135KB
MD50be6864d625233f790876678facc74c7
SHA148e5039c02b4f416ca87c412125da993c6f548bc
SHA256defaadae9a67418c60629828b47b051ad77902a170ec6c26f1fd7297b1139649
SHA512bb88079187d3d35c675af5cd69d2fa0ccf79dc97b15848fc3cfd3f0d6e295b4143b9d02f4c2d770e30f2aed0e6451b6d125945b23e0e85adb1bda5597124739a