Analysis
-
max time kernel
165s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 19:15
Behavioral task
behavioral1
Sample
e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe
Resource
win10v2004-20241007-en
General
-
Target
e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe
-
Size
216KB
-
MD5
118962ea993c489f14c068235b1a8397
-
SHA1
0f6e1c3388f65c6f483b15e6a35b8acdf0a93de6
-
SHA256
e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf
-
SHA512
8ebc8268f53f87698a2685ccc8d6233043f9f405abbe0dcba039c19f7862f37fbcced43a674dbccc97cadec44b0e10e0aa2dd06dd726751b81177762f642435b
-
SSDEEP
3072:GtSqS6SbEjAr+Y1/5G6yC2Yb6CyH6wap4EWHUW1:GtRmbEjAr+K/5mC2dH6wpL
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,,C:\\Users\\Admin\\AppData\\Local\\kkdunmrq\\squhxmbh.exe" e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe -
Modifies security service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mpssvc\Start = "4" e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe -
Ramnit family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe -
Windows security bypass 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\squhxmbh.exe e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\squhxmbh.exe e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe -
Windows security modification 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SquHxmbh = "C:\\Users\\Admin\\AppData\\Local\\kkdunmrq\\squhxmbh.exe" e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1680 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 968 e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe 968 e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe 968 e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe 968 e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe 2212 mspaint.exe 2212 mspaint.exe 2460 AcroRd32.exe 2460 AcroRd32.exe 2460 AcroRd32.exe 2460 AcroRd32.exe 2460 AcroRd32.exe 2460 AcroRd32.exe 2460 AcroRd32.exe 2460 AcroRd32.exe 2460 AcroRd32.exe 2460 AcroRd32.exe 2460 AcroRd32.exe 2460 AcroRd32.exe 2460 AcroRd32.exe 2460 AcroRd32.exe 2460 AcroRd32.exe 2460 AcroRd32.exe 2460 AcroRd32.exe 2460 AcroRd32.exe 2460 AcroRd32.exe 2460 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 968 e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2460 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 22 IoCs
pid Process 2212 mspaint.exe 2212 mspaint.exe 2212 mspaint.exe 2212 mspaint.exe 2460 AcroRd32.exe 2460 AcroRd32.exe 2460 AcroRd32.exe 2460 AcroRd32.exe 2460 AcroRd32.exe 2460 AcroRd32.exe 1680 EXCEL.EXE 1680 EXCEL.EXE 1680 EXCEL.EXE 1680 EXCEL.EXE 1680 EXCEL.EXE 1680 EXCEL.EXE 1680 EXCEL.EXE 1680 EXCEL.EXE 1680 EXCEL.EXE 1680 EXCEL.EXE 1680 EXCEL.EXE 1680 EXCEL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2460 wrote to memory of 3476 2460 AcroRd32.exe 108 PID 2460 wrote to memory of 3476 2460 AcroRd32.exe 108 PID 2460 wrote to memory of 3476 2460 AcroRd32.exe 108 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 2612 3476 RdrCEF.exe 109 PID 3476 wrote to memory of 656 3476 RdrCEF.exe 110 PID 3476 wrote to memory of 656 3476 RdrCEF.exe 110 PID 3476 wrote to memory of 656 3476 RdrCEF.exe 110 PID 3476 wrote to memory of 656 3476 RdrCEF.exe 110 PID 3476 wrote to memory of 656 3476 RdrCEF.exe 110 PID 3476 wrote to memory of 656 3476 RdrCEF.exe 110 PID 3476 wrote to memory of 656 3476 RdrCEF.exe 110 PID 3476 wrote to memory of 656 3476 RdrCEF.exe 110 PID 3476 wrote to memory of 656 3476 RdrCEF.exe 110 PID 3476 wrote to memory of 656 3476 RdrCEF.exe 110 PID 3476 wrote to memory of 656 3476 RdrCEF.exe 110 PID 3476 wrote to memory of 656 3476 RdrCEF.exe 110 PID 3476 wrote to memory of 656 3476 RdrCEF.exe 110 PID 3476 wrote to memory of 656 3476 RdrCEF.exe 110 PID 3476 wrote to memory of 656 3476 RdrCEF.exe 110 PID 3476 wrote to memory of 656 3476 RdrCEF.exe 110 PID 3476 wrote to memory of 656 3476 RdrCEF.exe 110 PID 3476 wrote to memory of 656 3476 RdrCEF.exe 110 PID 3476 wrote to memory of 656 3476 RdrCEF.exe 110 PID 3476 wrote to memory of 656 3476 RdrCEF.exe 110 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe"C:\Users\Admin\AppData\Local\Temp\e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.exe"1⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Modifies security service
- UAC bypass
- Windows security bypass
- Drops startup file
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:968
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\PopUpdate.dib"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2212
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:4372
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3580
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\UnblockWrite.cmd" "1⤵PID:1112
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\UnblockWrite.cmd" "1⤵PID:4644
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Desktop\UnblockWrite.cmd"1⤵PID:4724
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Desktop\EditDebug.pdf"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4F1002B9B93FDAED5575170F9D08DA01 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:2612
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=D208C87ED3E7CB322DD30FBD66E958E6 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=D208C87ED3E7CB322DD30FBD66E958E6 --renderer-client-id=2 --mojo-platform-channel-handle=1768 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:656
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E695921AE604DB563BB5583ED1377082 --mojo-platform-channel-handle=1816 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:1840
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D566A229C84EA0807FCD8B9960CD3186 --mojo-platform-channel-handle=2360 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:4464
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7FC5D2487097F31549F70DEC498CBA9B --mojo-platform-channel-handle=2440 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:2468
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=81D5D07DE2E0AA544BC1824CC8D6B3D5 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=81D5D07DE2E0AA544BC1824CC8D6B3D5 --renderer-client-id=8 --mojo-platform-channel-handle=2516 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:3292
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:552
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\ResetEdit.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1680
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5f8163d08585f43f2d7d4609d92c8f5e3
SHA1c6a972f1643091a8e5cc11f2e5b58e5b1eebc9d7
SHA25685b5bfcfb4060477cba6bf4c8e27741b22922a49160c9cc8e57c56e88c435a8c
SHA5121050ff4bbf8d47113dbbb8865b4ee38a06df3ab27f4c050b6baf1b2d55e36a47836032e3a2decc85da16c3dafa276a83d6196c1bb98137c211adbb6ff5d8f1e1
-
Filesize
394B
MD56fd29ea23b64b3fc00966a7c0681d6a2
SHA1bd03892fc0beef8c705a374a07e19baaced8249a
SHA256ae3ea4b864eb886ca4cdcc7e3faa78069c94056292ebdc33a1adc719f628bfcb
SHA512d9837f57359ef38172b046b17b68883185ee9ccabaa7ab2d030a8e5cbd4b79e1e0d53f47775d2495bc9608c15a8f0a7a95d627a5f1b6cb42623f31dd398a318f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5e14efe5b82daef0d8b4fae937f61138a
SHA1354a5bea6cead7dd5f4a8fc03fbb34d80526236b
SHA256e97761d999599eab70c5bfa6965d2955b1ba7e73dd7d51b29fdf88765ac32f5c
SHA512c99599867dbcbf9c0d0916232bda21e0bd28f0611e3400829604ae3a548588835d9607c8080094115780079d99dbd7ffe3eea24d3110f14b4e96fddc24c24b14
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5265afc9d8ea7df7362f4ed9877e261e5
SHA102274ce7d90f0999960f9973a3755d9b2241a8c2
SHA256284f614f0989bcc264a7d60421f47645b98c4548e3dcc381130e0c7f763b8742
SHA51272ea949bfc6cc9c9f707e60e086d8b0a3d31e2a2c9424f2104669200b6c2df0ecf0ae63b5cf585fdf6f1b03f91caf5db83d4e57910f7b5f3fb76b09dc4dbaf62