Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 20:22
Behavioral task
behavioral1
Sample
f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe
Resource
win10v2004-20241007-en
General
-
Target
f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe
-
Size
1.5MB
-
MD5
92fc1b64d702ebee25b1cabea2a81ae0
-
SHA1
1d3d5ec151eae49d8186d755db49c0d2b1df1a76
-
SHA256
f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730
-
SHA512
ac8ad02121c75db44ce5c67c4e7ec7cfdcb2fdcb5577c2675d8c7c63fca27c86626ee45e92c8ec58efedfb35bf9e863b76d482e45eb4dd1427b9a88c73e1981d
-
SSDEEP
24576:ansJ39LyjbJkQFMhmC+6GD9u5xolYQY6dp7gAVKzar5:ansHyjtk2MYC5GDjYmp7gAVK2
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Xred family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 12 IoCs
pid Process 1624 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 5096 Synaptics.exe 2124 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730n.exe 2912 icsys.icn.exe 1284 explorer.exe 4792 ._cache_Synaptics.exe 3384 spoolsv.exe 2888 ._cache_synaptics.exe 3516 svchost.exe 2688 spoolsv.exe 2096 icsys.icn.exe 4372 explorer.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4484 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2912 icsys.icn.exe 2912 icsys.icn.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 3516 svchost.exe 3516 svchost.exe 3516 svchost.exe 3516 svchost.exe 3516 svchost.exe 3516 svchost.exe 1284 explorer.exe 1284 explorer.exe 3516 svchost.exe 3516 svchost.exe 3516 svchost.exe 3516 svchost.exe 3516 svchost.exe 3516 svchost.exe 1284 explorer.exe 1284 explorer.exe 3516 svchost.exe 3516 svchost.exe 3516 svchost.exe 3516 svchost.exe 1284 explorer.exe 1284 explorer.exe 3516 svchost.exe 3516 svchost.exe 1284 explorer.exe 1284 explorer.exe 3516 svchost.exe 3516 svchost.exe 1284 explorer.exe 1284 explorer.exe 3516 svchost.exe 3516 svchost.exe 1284 explorer.exe 1284 explorer.exe 3516 svchost.exe 3516 svchost.exe 1284 explorer.exe 1284 explorer.exe 3516 svchost.exe 3516 svchost.exe 1284 explorer.exe 1284 explorer.exe 3516 svchost.exe 3516 svchost.exe 1284 explorer.exe 1284 explorer.exe 3516 svchost.exe 3516 svchost.exe 1284 explorer.exe 1284 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1284 explorer.exe 3516 svchost.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
pid Process 1624 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 1624 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 2912 icsys.icn.exe 2912 icsys.icn.exe 4792 ._cache_Synaptics.exe 1284 explorer.exe 4792 ._cache_Synaptics.exe 1284 explorer.exe 3384 spoolsv.exe 3384 spoolsv.exe 3516 svchost.exe 3516 svchost.exe 2688 spoolsv.exe 2688 spoolsv.exe 1284 explorer.exe 1284 explorer.exe 4484 EXCEL.EXE 4484 EXCEL.EXE 2096 icsys.icn.exe 2096 icsys.icn.exe 4372 explorer.exe 4372 explorer.exe 4484 EXCEL.EXE 4484 EXCEL.EXE 4484 EXCEL.EXE 4484 EXCEL.EXE 4484 EXCEL.EXE 4484 EXCEL.EXE -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 4764 wrote to memory of 1624 4764 f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 85 PID 4764 wrote to memory of 1624 4764 f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 85 PID 4764 wrote to memory of 1624 4764 f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 85 PID 4764 wrote to memory of 5096 4764 f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 86 PID 4764 wrote to memory of 5096 4764 f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 86 PID 4764 wrote to memory of 5096 4764 f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 86 PID 1624 wrote to memory of 2124 1624 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 87 PID 1624 wrote to memory of 2124 1624 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 87 PID 1624 wrote to memory of 2912 1624 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 89 PID 1624 wrote to memory of 2912 1624 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 89 PID 1624 wrote to memory of 2912 1624 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 89 PID 2912 wrote to memory of 1284 2912 icsys.icn.exe 91 PID 2912 wrote to memory of 1284 2912 icsys.icn.exe 91 PID 2912 wrote to memory of 1284 2912 icsys.icn.exe 91 PID 5096 wrote to memory of 4792 5096 Synaptics.exe 90 PID 5096 wrote to memory of 4792 5096 Synaptics.exe 90 PID 5096 wrote to memory of 4792 5096 Synaptics.exe 90 PID 1284 wrote to memory of 3384 1284 explorer.exe 93 PID 1284 wrote to memory of 3384 1284 explorer.exe 93 PID 1284 wrote to memory of 3384 1284 explorer.exe 93 PID 4792 wrote to memory of 2888 4792 ._cache_Synaptics.exe 94 PID 4792 wrote to memory of 2888 4792 ._cache_Synaptics.exe 94 PID 3384 wrote to memory of 3516 3384 spoolsv.exe 95 PID 3384 wrote to memory of 3516 3384 spoolsv.exe 95 PID 3384 wrote to memory of 3516 3384 spoolsv.exe 95 PID 3516 wrote to memory of 2688 3516 svchost.exe 96 PID 3516 wrote to memory of 2688 3516 svchost.exe 96 PID 3516 wrote to memory of 2688 3516 svchost.exe 96 PID 4792 wrote to memory of 2096 4792 ._cache_Synaptics.exe 97 PID 4792 wrote to memory of 2096 4792 ._cache_Synaptics.exe 97 PID 4792 wrote to memory of 2096 4792 ._cache_Synaptics.exe 97 PID 3516 wrote to memory of 4836 3516 svchost.exe 98 PID 3516 wrote to memory of 4836 3516 svchost.exe 98 PID 3516 wrote to memory of 4836 3516 svchost.exe 98 PID 2096 wrote to memory of 4372 2096 icsys.icn.exe 100 PID 2096 wrote to memory of 4372 2096 icsys.icn.exe 100 PID 2096 wrote to memory of 4372 2096 icsys.icn.exe 100 PID 3516 wrote to memory of 1916 3516 svchost.exe 120 PID 3516 wrote to memory of 1916 3516 svchost.exe 120 PID 3516 wrote to memory of 1916 3516 svchost.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe"C:\Users\Admin\AppData\Local\Temp\f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
\??\c:\users\admin\appdata\local\temp\._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730n.exec:\users\admin\appdata\local\temp\._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730n.exe3⤵
- Executes dropped EXE
PID:2124
-
-
C:\Users\Admin\AppData\Local\icsys.icn.exeC:\Users\Admin\AppData\Local\icsys.icn.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3384 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3516 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2688
-
-
C:\Windows\SysWOW64\at.exeat 20:24 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe7⤵
- System Location Discovery: System Language Discovery
PID:4836
-
-
C:\Windows\SysWOW64\at.exeat 20:25 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe7⤵
- System Location Discovery: System Language Discovery
PID:1916
-
-
-
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4792 -
\??\c:\users\admin\appdata\local\temp\._cache_synaptics.exec:\users\admin\appdata\local\temp\._cache_synaptics.exe InjUpdate4⤵
- Executes dropped EXE
PID:2888
-
-
C:\Users\Admin\AppData\Local\icsys.icn.exeC:\Users\Admin\AppData\Local\icsys.icn.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4372
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4484
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD592fc1b64d702ebee25b1cabea2a81ae0
SHA11d3d5ec151eae49d8186d755db49c0d2b1df1a76
SHA256f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730
SHA512ac8ad02121c75db44ce5c67c4e7ec7cfdcb2fdcb5577c2675d8c7c63fca27c86626ee45e92c8ec58efedfb35bf9e863b76d482e45eb4dd1427b9a88c73e1981d
-
C:\Users\Admin\AppData\Local\Temp\._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe
Filesize794KB
MD5020e3a7e3dea3fa0efc7dfd92eec9b74
SHA141b784857d38376f5c56aed0fa8181e5810192ef
SHA2560ca516bbce57427d0819d15a1d02f46cbdbe0729d8d79d8321176e91e3444e57
SHA5122f68fef8d0bc9cea789a8963cf10dfe51ea6313c8cc2b862dde9c3b9da1fa55d787de28e8f076c56be7541f99624e80103c44b44dcfa0e81fb18f633bea68f53
-
C:\Users\Admin\AppData\Local\Temp\._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730n.exe
Filesize587KB
MD51799da063f7a1b0c93ea50bc000097f1
SHA1362877bf4f45e2552524fde912a2e6ced309a1a5
SHA2562e41ff11d78405149f88dd9a02347cb94eb044ce4ff4c5001c9e990f53d6e4ae
SHA512cc6878d14930d2419eea813877e7e197441295d00d22f400b8f4354c57157742048c2954469eeb68381c6377dcc3d326480c15e24beb8429e67ed73da636efae
-
Filesize
24KB
MD5c7af1c967c985311e2a4a1f2b029dcfa
SHA1940ba6219e2b099d0aa9b3634b27ba4e2ba4e2a2
SHA256f52ecb335652034daaaaab61e19f1d0521e9da859b917a99679186ff9868ec6b
SHA512e6a5d1c875fff327eb9c765bf65e4462fab9a3e2ed59d8bf0a55bbf373d10fad017397d9f15a341e7035a4801d15f64f018ab586d97a8a67b7254eadced90e50
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
206KB
MD534a4e56b76b7a84797188bdc281c99ac
SHA1a40b57f5ecaa1770f15be361a4f97468f054eaa5
SHA256210a6be7ccb3a097ff5e26d97c242bfec0e87927e9a539a65e5613b0a2723b87
SHA512ce505811c995b1b7f8e7451aad6768e0e2e552d6f7e7e577dafa2d4ed3c1543b60ea998e687d46f2ac2135d9b1aab9e41d2a5fd70c4b0976d2ee345a0864ece6
-
Filesize
206KB
MD5854359f594e26980f1874d7305cc8047
SHA180ecd8231c86eb35b01253603ba47f2b06473f70
SHA25682014163c224c1297db3372b53e53c56e1eaa36593acea97bce333510400b354
SHA512617e5a771430c422201a73a1d7d020d55310ea5db167f4ed59920b3625c359b45d85c9cedf19b407b75c8756b918c627c0c03a79d69a1aa24696f72094fbed3f
-
Filesize
206KB
MD5fbeef1877a06a39dd5621de366d8a735
SHA133287289c163c6835094da390b1e767c5d8b873f
SHA2561636254c92f5e2f630e84b2dadc3e5ad53ab425f331c04ec0ee81c63dac3e913
SHA512b35d0c810ceebae440fe065eaa8e0050350fc73fb4efe5698a7ee6afb79f4721e18bde23bafa84d8b5494de9034ee690a7acceb0a676ef2f56ac5546f4f83317
-
Filesize
206KB
MD5a159247483cf1659d45222ec6844f2fe
SHA14fba585df57b9ed17a2a436c849687d71cd30b09
SHA256c8dffa407b6f32b102231cef0cf24b2f60a136ab15ba681ab5d90dc6ee323e82
SHA512438209ef693d4e0731dab9cdb5a2a30f9c7de701bf8d455534aa825bd5c69168a9dc9fd9d28b3c4f5e4ddf02733473dd53d71b8deda078d36729f9a6f1657a5f
-
Filesize
206KB
MD5debe4c6df95b841d7ac8aff616949fa9
SHA16d3ebf001c11acb5a6b9d425c6e19e63dc2acb9c
SHA2561190e3dde1284f7582acd13c27a86db557aaf16a69984cea9626fb6153cd4564
SHA512e89445291a0f28d232210378ba801a21948cd18c0af6e9d1b00910510f3304d23e7e45cf6f1069f97662b4f992e9fb56c5109c2d30a7807231c5a8264037cbf1