Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 20:21
Behavioral task
behavioral1
Sample
4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe
Resource
win10v2004-20241007-en
General
-
Target
4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe
-
Size
2.6MB
-
MD5
0114727c340e4ff952938ff19491b098
-
SHA1
72bd39f695b9580c76382e5d91b337f27c951dca
-
SHA256
4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb
-
SHA512
43047984f8f8a391133194d7d203b2e5efb55410abc7e8faa057c2b7695513963a28bfb822775d68263934f20b2c8b73d43a4dc67208329e4d435f6e2ef9a4db
-
SSDEEP
49152:gnsHyjtk2MYC5GDnYolY+iOo7/PpGpL0oh6jgvp:gnsmtk2aDoCOqpG1fh6jgh
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Xred family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 11 IoCs
pid Process 2708 ._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe 964 Synaptics.exe 4816 ._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe 5080 ._cache_Synaptics.exe 4604 ._cache_synaptics.exe 1832 icsys.icn.exe 2028 explorer.exe 3756 spoolsv.exe 4528 svchost.exe 2180 spoolsv.exe 2004 icsys.icn.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4816 ._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe 4604 ._cache_synaptics.exe 4816 ._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe 4604 ._cache_synaptics.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 832 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1832 icsys.icn.exe 1832 icsys.icn.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 4528 svchost.exe 4528 svchost.exe 4528 svchost.exe 4528 svchost.exe 4528 svchost.exe 2028 explorer.exe 4528 svchost.exe 2028 explorer.exe 2028 explorer.exe 4528 svchost.exe 4528 svchost.exe 2028 explorer.exe 2028 explorer.exe 4528 svchost.exe 2028 explorer.exe 4528 svchost.exe 4528 svchost.exe 2028 explorer.exe 4528 svchost.exe 2028 explorer.exe 2028 explorer.exe 4528 svchost.exe 2028 explorer.exe 4528 svchost.exe 2028 explorer.exe 4528 svchost.exe 2028 explorer.exe 4528 svchost.exe 4528 svchost.exe 2028 explorer.exe 4528 svchost.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 4528 svchost.exe 4528 svchost.exe 4528 svchost.exe 2028 explorer.exe 2028 explorer.exe 4528 svchost.exe 2028 explorer.exe 4528 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2028 explorer.exe 4528 svchost.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
pid Process 2708 ._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe 2708 ._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe 5080 ._cache_Synaptics.exe 5080 ._cache_Synaptics.exe 832 EXCEL.EXE 832 EXCEL.EXE 1832 icsys.icn.exe 832 EXCEL.EXE 1832 icsys.icn.exe 832 EXCEL.EXE 2028 explorer.exe 2028 explorer.exe 3756 spoolsv.exe 3756 spoolsv.exe 4528 svchost.exe 4528 svchost.exe 2180 spoolsv.exe 2180 spoolsv.exe 2028 explorer.exe 2028 explorer.exe 2004 icsys.icn.exe 2004 icsys.icn.exe 832 EXCEL.EXE 832 EXCEL.EXE -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 1488 wrote to memory of 2708 1488 4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe 83 PID 1488 wrote to memory of 2708 1488 4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe 83 PID 1488 wrote to memory of 2708 1488 4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe 83 PID 1488 wrote to memory of 964 1488 4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe 84 PID 1488 wrote to memory of 964 1488 4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe 84 PID 1488 wrote to memory of 964 1488 4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe 84 PID 2708 wrote to memory of 4816 2708 ._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe 85 PID 2708 wrote to memory of 4816 2708 ._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe 85 PID 964 wrote to memory of 5080 964 Synaptics.exe 86 PID 964 wrote to memory of 5080 964 Synaptics.exe 86 PID 964 wrote to memory of 5080 964 Synaptics.exe 86 PID 5080 wrote to memory of 4604 5080 ._cache_Synaptics.exe 88 PID 5080 wrote to memory of 4604 5080 ._cache_Synaptics.exe 88 PID 5080 wrote to memory of 1832 5080 ._cache_Synaptics.exe 90 PID 5080 wrote to memory of 1832 5080 ._cache_Synaptics.exe 90 PID 5080 wrote to memory of 1832 5080 ._cache_Synaptics.exe 90 PID 1832 wrote to memory of 2028 1832 icsys.icn.exe 91 PID 1832 wrote to memory of 2028 1832 icsys.icn.exe 91 PID 1832 wrote to memory of 2028 1832 icsys.icn.exe 91 PID 2028 wrote to memory of 3756 2028 explorer.exe 92 PID 2028 wrote to memory of 3756 2028 explorer.exe 92 PID 2028 wrote to memory of 3756 2028 explorer.exe 92 PID 3756 wrote to memory of 4528 3756 spoolsv.exe 93 PID 3756 wrote to memory of 4528 3756 spoolsv.exe 93 PID 3756 wrote to memory of 4528 3756 spoolsv.exe 93 PID 4528 wrote to memory of 2180 4528 svchost.exe 94 PID 4528 wrote to memory of 2180 4528 svchost.exe 94 PID 4528 wrote to memory of 2180 4528 svchost.exe 94 PID 2708 wrote to memory of 2004 2708 ._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe 95 PID 2708 wrote to memory of 2004 2708 ._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe 95 PID 2708 wrote to memory of 2004 2708 ._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe 95 PID 4528 wrote to memory of 4464 4528 svchost.exe 96 PID 4528 wrote to memory of 4464 4528 svchost.exe 96 PID 4528 wrote to memory of 4464 4528 svchost.exe 96 PID 4528 wrote to memory of 3940 4528 svchost.exe 116 PID 4528 wrote to memory of 3940 4528 svchost.exe 116 PID 4528 wrote to memory of 3940 4528 svchost.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe"C:\Users\Admin\AppData\Local\Temp\4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe"C:\Users\Admin\AppData\Local\Temp\._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\users\admin\appdata\local\temp\._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exec:\users\admin\appdata\local\temp\._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4816
-
-
C:\Users\Admin\AppData\Local\icsys.icn.exeC:\Users\Admin\AppData\Local\icsys.icn.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2004
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5080 -
\??\c:\users\admin\appdata\local\temp\._cache_synaptics.exec:\users\admin\appdata\local\temp\._cache_synaptics.exe InjUpdate4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4604
-
-
C:\Users\Admin\AppData\Local\icsys.icn.exeC:\Users\Admin\AppData\Local\icsys.icn.exe4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3756 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4528 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2180
-
-
C:\Windows\SysWOW64\at.exeat 20:34 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe8⤵
- System Location Discovery: System Language Discovery
PID:4464
-
-
C:\Windows\SysWOW64\at.exeat 20:35 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe8⤵
- System Location Discovery: System Language Discovery
PID:3940
-
-
-
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:832
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD50114727c340e4ff952938ff19491b098
SHA172bd39f695b9580c76382e5d91b337f27c951dca
SHA2564b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb
SHA51243047984f8f8a391133194d7d203b2e5efb55410abc7e8faa057c2b7695513963a28bfb822775d68263934f20b2c8b73d43a4dc67208329e4d435f6e2ef9a4db
-
C:\Users\Admin\AppData\Local\Temp\._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe
Filesize1.9MB
MD56cab864533a299853f65a2c65d2c013b
SHA158d06ffffe4e4b14b7eb392a2ce8aa1e9ab27cf9
SHA2562cd738461c8944a57780cbbc426c189599bd7c32ba8b38a56493fb3ba3e2624c
SHA512a49273595d740c17f8b2a0d87e7f9ab89971edb70fe782178cecd44dda9c1a7690d4a777a22ffa98add482f5e538aeba7bfb4279883a1b6b6113513cd7e5814b
-
Filesize
23KB
MD5dadf32f5f12d0758fc49a94ab509c6f8
SHA142158405dbbd264d657ce3c1d96b901061101167
SHA256eb9e6a90158249b31f029acbae97535055211ea890cf5f2bcb79974c7bbe6146
SHA51281c4f7cd515fe80fafa88e7dd8de4d8aeabe16fcab68fdfef5390d847de23ca229b6c9cee75a204c6e3b4ba882bb6247a351daf7003e5182f27c53d2aa82cbcb
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
206KB
MD5370a09c146d6836b664651e7d92d3e8d
SHA1eabeb391996a2eda0b30e088cdde381f4b737dd4
SHA2567c0b05b33d7fdc83fb72b7fc9685666e24c7a3846cf33dabd83ab579a296fd40
SHA51298faccdd90d5c9f5ef09ee1184e92d98e89585f7aec0a764af9e23dec0d8aba22bf8071fead54f4a68c60d82de77ff095782f33364cbaf0dddce5a94ce2740c1
-
Filesize
206KB
MD5f7c8de8f41e4ef1dd8e0df12497feada
SHA14272fdbe659cf53f7051c2fb5a588d746bd00dca
SHA256903d2642ba462a0a665bb9e4a58b13f5b48ba61f92629f343b3ff5f2bd57b994
SHA5128590d689f43ab9764e74641fc6f439fe5cffbe0a36300da6493515c59470a6057482efe1e83e765408777e4da256b53fe7dc95535dede8317651e0b6cbea78cc
-
Filesize
206KB
MD5ce2b169f380ca1f0ce5b4f6b88403ac8
SHA155d1881fe5d1ccdcc8517e229bb7ca0e4f01ca77
SHA256ed01d9052095d5856be99453e9dd2d5e29f78d658cf413d938d13c592c101bb6
SHA512681ea78bd4c49367a25b852deea576efa32172e35789ef70bc6b6561a651a6881a2440f671a710e5ed997048ae8d65edb89b1a7eec8706b4b6574164ffb169f0
-
Filesize
206KB
MD568f5314be20128ea9839f1b423ccb317
SHA105c88c214431c4a52d563d132ed365dbd2ba44a1
SHA256276afb77f794284b6ffc3daea299e1ae7d5a46443a51546a126b46a8d27b76ec
SHA512a53e767a10776e6f0c9da602aff444fdd0ccb4f426059622c52a7e7cb1e71541aaddee0e42276691a40ef0a8ec65727778e503a67d8f5103630db13bbecfd2ae
-
\??\c:\users\admin\appdata\local\temp\._cache_4b07f194b3dec3f31d74bf45b445502f79bd76956c5cb2e4c30eea0aa0efeecb.exe
Filesize1.7MB
MD5408e9726f1a063874b9b841f1a066e7a
SHA1a7bde856807a58ff4278974b28aba0e0b475c6fd
SHA256bc9f40641b7b1652a42939695a79f4b2b2cf109f0c6f7ebeae4a060915fea311
SHA5120efa1d8bfdd881df71d68934898eb76c7e7672d80688aae4b9029c450900490e7fd3a5a801033edb919e05188b222246d1c418907b1b7f8624c3f909c400532b
-
Filesize
206KB
MD561a8ed0d8e6dcf0609a3e08b4c516df8
SHA1c5ba8e2d7e50b3c0298c8e8c78c01541b5e2cf96
SHA25696e11bf0b23212d34ce65b28c3dd80ed93e0d61f4fbe393ad485ff02eb7023c8
SHA51265dc43b9ef42ee467fde4328df244fc955fbf14cc02688bb17da8467c52be66040f32f7517a9795f28f026844d90eac01938c94e5432f7a8703c56b03fe6cf75