Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-02-2025 03:12
Behavioral task
behavioral1
Sample
46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe
Resource
win10v2004-20250129-en
General
-
Target
46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe
-
Size
15.7MB
-
MD5
69b41cf98c265e6dcc00161fd0f300c0
-
SHA1
62a9fa9eda1f95cbcd14b7fee4c2f7213d6d1f7b
-
SHA256
46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48
-
SHA512
0caee441fdc2835fd732780fbf2a6a11101e025d140b14c7f794d7f3e99b1c33f74916b05d49468d64bf06c312b651f2829cff560690f484de315a5dab9bef21
-
SSDEEP
196608:da9+6Y7SOEibgRrwo8NUu7gh1a9+6Y7SOEibgRrwo8NUu7ghvyHFkr23LO:dFgRrwo8N41FgRrwo8N4vyC
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral1/memory/2296-0-0x0000000000400000-0x0000000000613000-memory.dmp family_blackmoon behavioral1/files/0x0001000000011ca2-13.dat family_blackmoon -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe -
Xmrig family
-
XMRig Miner payload 17 IoCs
resource yara_rule behavioral1/memory/2296-0-0x0000000000400000-0x0000000000613000-memory.dmp xmrig behavioral1/files/0x0008000000016276-6.dat xmrig behavioral1/files/0x0001000000011ca2-13.dat xmrig behavioral1/memory/2344-257-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2344-341-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2344-342-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2344-365-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2344-386-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2344-388-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2344-751-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2344-752-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2344-753-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2344-754-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2344-755-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2344-756-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2344-757-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/2344-758-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZhuDongFangYu.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe" 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe" 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Tray.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Tray.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe" 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe" 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZhuDongFangYu.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQPCTray.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQPCTray.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe" 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe" 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe -
Executes dropped EXE 1 IoCs
pid Process 2344 svchost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe" 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\IME\IMEJP10\IMJPDADM.EXE 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\comp.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\iscsicpl.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\rundll32.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\TRACERT.EXE 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\verclsid.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\IME\IMESC5\IMSCPROP.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\mode.com 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\bitsadmin.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\cscript.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\grpconv.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\InfDefaultInstall.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\Ribbons.scr 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\regedit.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\ndadmin.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\whoami.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\format.com 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\wuapp.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\System32\DriverStore\FileRepository\bth.inf_amd64_neutral_e54666f6a3e5af91\fsquirt.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\wbem\mofcomp.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\cmdkey.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\instnm.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\mobsync.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\WPDShextAutoplay.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\fsutil.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\label.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\PushPrinterConnections.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\auditpol.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\wimserv.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\System32\DriverStore\FileRepository\divacx64.inf_amd64_neutral_fa0f82f024789743\xlog.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\Mystify.scr 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\TCPSVCS.EXE 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\eventvwr.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\icacls.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\setx.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\taskmgr.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\msinfo32.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\nslookup.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\poqexec.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\RMActivate_isv.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\dpnsvr.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\drvinst.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\hdwwiz.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\hh.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\write.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\IME\IMEJP10\imjpuexc.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\WerFault.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\IME\shared\IMEPADSV.EXE 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\InstallShield\_isdel.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\wbem\WMIADAP.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\dialer.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\fc.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\setup16.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\SystemPropertiesHardware.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\expand.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\help.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\HOSTNAME.EXE 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\LocationNotifications.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\mtstocom.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\odbcconf.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\psr.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\sdiagnhost.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\setupugc.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\wecutil.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Oarpmany.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Garden.htm 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\airappinstaller.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files (x86)\Windows Media Player\wmprph.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\cpu.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\Windows Mail\WinMail.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\about.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\cpu.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\slideShow.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\settings.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\settings.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{5059450D-F254-431C-8EC5-1212E61F2D77}\chrome_installer.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\vlm_export.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\mosaic_window.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsVersion1Warning.htm 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\epl-v10.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\settings.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\Internet Explorer\iexplore.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\picturePuzzle.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Soft Blue.htm 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsMacroTemplate.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\clock.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\calendar.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\cpu.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\Windows Photo Viewer\ImagingDevices.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\settings.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\weather.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsViewFrame.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.htm 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\Internet Explorer\ieinstal.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files (x86)\Windows Media Player\wmpenc.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile_view.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\batch_window.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\cpu.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.htm 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\about.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\settings.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\picturePuzzle.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\settings.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\README-JDK.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\settings.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsHomePage.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\winsxs\x86_microsoft-windows-g..s-weather.resources_31bf3856ad364e35_6.1.7600.16385_es-es_3687be952df5b9b1\weather.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\x86_microsoft-windows-grpconv_31bf3856ad364e35_6.1.7600.16385_none_a25e7b019f016e70\grpconv.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-a..atibility-assistant_31bf3856ad364e35_6.1.7600.16385_none_8fbb77bb3cd808d1\pcawrk.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\x86_microsoft-windows-write_31bf3856ad364e35_6.1.7600.16385_none_5f5928533e6b72c0\write.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-t..es-commandlinetools_31bf3856ad364e35_6.1.7601.17514_none_42d65ed50fa3c682\tscon.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..-japanese-utilities_31bf3856ad364e35_6.1.7601.17514_none_ef38a8d0d05cc2c7\IMJPDADM.EXE 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\x86_microsoft-windows-international-core_31bf3856ad364e35_6.1.7601.17514_none_ebb1ce7438031941\MuiUnattend.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\x86_microsoft-windows-magnify_31bf3856ad364e35_6.1.7600.16385_none_6e042d8ffa037534\Magnify.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_es-es_b8490213a810a8a5\500-16.htm 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\ehome\ehsched.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\wow64_microsoft-windows-wow64_31bf3856ad364e35_6.1.7600.16385_none_ce6f64032560fa6b\instnm.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..-currency.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_0028f64744b4fccd\currency.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-s..otservicing-utility_31bf3856ad364e35_6.1.7600.16385_none_d139a2cea567ce3f\fveupdate.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-netbt_31bf3856ad364e35_6.1.7601.17514_none_be8acdd10de3b1a6\netbtugc.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_de-de_0f8ccf36b90bab3b\403-8.htm 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-com-complus-ui_31bf3856ad364e35_6.1.7600.16385_none_0c9cb55c61e99805\dcomcnfg.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\wow64_microsoft-windows-i..tional-chinese-core_31bf3856ad364e35_6.1.7601.17514_none_c1fead4e4bf85947\IMTCPROP.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\wow64_microsoft-windows-xpsreachviewer_31bf3856ad364e35_6.1.7600.16385_none_7b64ef799c494a30\xpsrchvw.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\x86_microsoft-windows-diskraid_31bf3856ad364e35_6.1.7601.17514_none_67910dfbf63c4aae\diskraid.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..ets-clock.resources_31bf3856ad364e35_6.1.7600.16385_it-it_0c889693e4e0f25f\settings.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_es-es_b8490213a810a8a5\403-18.htm 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_regiis.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..tional-chinese-core_31bf3856ad364e35_6.1.7601.17514_none_b7aa02fc1797974c\IMTCPROP.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\x86_microsoft-windows-s..or-native-serverbox_31bf3856ad364e35_6.1.7601.17514_none_71c62979c253e895\RMActivate_ssp.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\WPF\Fonts\GlobalMonospace.CompositeFont 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_netfx-aspnet_web_config_b03f5f7f11d50a3a_6.1.7600.16385_none_2af2acecc5b06906\web.config.comments 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\Backup\x86_microsoft-windows-b..onment-dvd-etfsboot_31bf3856ad364e35_6.1.7600.16385_none_82523ed4cbbd035a_etfsboot.com_ef11feb5 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..ets-clock.resources_31bf3856ad364e35_6.1.7600.16385_en-us_dbfc68edd3137610\settings.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-choice_31bf3856ad364e35_6.1.7601.17514_none_218cf07ba262766c\choice.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\x86_microsoft-windows-takeown_31bf3856ad364e35_6.1.7601.17514_none_fbf2cfb573e03306\takeown.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\x86_microsoft-windows-taskkill_31bf3856ad364e35_6.1.7600.16385_none_25545528bd642170\taskkill.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_de-de_0f8ccf36b90bab3b\404-5.htm 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_it-it_45286e597214a485\502.htm 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-mail-app_31bf3856ad364e35_6.1.7601.17514_none_4f7e32f76654bd3c\Soft Blue.htm 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-ie-internetexplorer_31bf3856ad364e35_8.0.7600.16385_none_a61138e7aab17fed\ieUnatt.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-rpc-locator_31bf3856ad364e35_6.1.7600.16385_none_2b2984d40648fbe7\Locator.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-systemrestore-main_31bf3856ad364e35_6.1.7601.17514_none_a505d556c9de886a\rstrui.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-f..opycompareutilities_31bf3856ad364e35_6.1.7600.16385_none_3575d2dc8edf4a22\diskcopy.com 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..s-weather.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_c1ab456ba37238a2\settings.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..ets-clock.resources_31bf3856ad364e35_6.1.7600.16385_en-us_7fddcd6a1ab604da\settings.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\Backup\wow64_microsoft-windows-p..installerandprintui_31bf3856ad364e35_6.1.7601.17514_none_3eceef6140ec9728_printui.exe_bb673fff 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\x86_microsoft-windows-certutil_31bf3856ad364e35_6.1.7600.16385_none_b55b5e1094b0283d\certutil.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-gettingstarted_31bf3856ad364e35_6.1.7600.16385_none_dc7256ed0ded6c12\GettingStarted.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-tabletpc-inkwatson_31bf3856ad364e35_6.1.7600.16385_none_644c1a991aac9ffb\InkWatson.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\x86_microsoft-windows-servicingstack_31bf3856ad364e35_6.1.7600.16385_none_0935b76c289e0fd5\PkgMgr.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\x86_wcf-icardagt_exe_31bf3856ad364e35_6.1.7600.16385_none_31ae00ebd2fb34b5\icardagt.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-m..ommandlineutilities_31bf3856ad364e35_6.1.7600.16385_none_d911df4e81059b22\mode.com 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..-currency.resources_31bf3856ad364e35_6.1.7600.16385_it-it_ba2212be09f75c28\currency.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\x86_microsoft-windows-mail-app_31bf3856ad364e35_6.1.7601.17514_none_f35f9773adf74c06\Roses.htm 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-rasautodial_31bf3856ad364e35_6.1.7600.16385_none_6bcef05d7f04260a\rasautou.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\x86_microsoft-windows-regini_31bf3856ad364e35_6.1.7600.16385_none_0c2c92921b2478ef\regini.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_5b0078129ae2bf07\401-2.htm 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-blb-cli-main_31bf3856ad364e35_6.1.7600.16385_none_a749cec7a8b6bf08\wbadmin.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\wow64_microsoft-windows-m..player-shellpreview_31bf3856ad364e35_6.1.7600.16385_none_26e76f2ac1492952\wmprph.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-ehome-mcglidhost_31bf3856ad364e35_6.1.7600.16385_none_05a2b72417ec1c6a\mcGlidHost.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-ehome-devices-mcx2prov_31bf3856ad364e35_6.1.7600.16385_none_3482237b32c1daff\Mcx2Prov.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\Backup\wow64_microsoft-windows-htmlhelp_31bf3856ad364e35_6.1.7600.16385_none_2e9f92abd2ce43b6_hh.exe_f87e0044 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_en-us_b87da52fa7e9b700\404-13.htm 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\ehome\ehrec.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_state.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\x86_microsoft-windows-chkdsk_31bf3856ad364e35_6.1.7600.16385_none_c1bcb003ee041301\chkdsk.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..zlegadget.resources_31bf3856ad364e35_6.1.7600.16385_en-us_0246f6465cb859ba\picturePuzzle.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\WsatConfig\9683999d889dc0b8782c782e2fc1aee5\WsatConfig.ni.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2296 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Token: 33 2296 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Token: SeIncBasePriorityPrivilege 2296 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Token: SeIncBasePriorityPrivilege 2344 svchost.exe Token: SeLockMemoryPrivilege 2344 svchost.exe Token: SeLockMemoryPrivilege 2344 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2296 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2344 2296 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe 31 PID 2296 wrote to memory of 2344 2296 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe 31 PID 2296 wrote to memory of 2344 2296 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe 31 PID 2296 wrote to memory of 2344 2296 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe 31 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe"C:\Users\Admin\AppData\Local\Temp\46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe"1⤵
- UAC bypass
- Event Triggered Execution: Image File Execution Options Injection
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2296 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16.2MB
MD582aec67883ac16a103b38afa98ce36a3
SHA1cbdb60013363e4cf38cf328d9e58f5bc716c73a9
SHA25677d4a20eec271055ba7cdf4a3c0908f6d2be36df5f6519af6ecc925259309ad2
SHA512c1cb6667e501b4a21968cf1c00be3c01c34f08f4e5dbefde9a5efd9da06fd23e489c060edfbee6baeada501586cbc404abb041d72afd070240115076fad2050b
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\epl-v10.html
Filesize16KB
MD5ed1191da9c4f74a60d695a25686f374e
SHA13a427657c16a716be332587425101653c25221d0
SHA256ab8cafd1958c27d70adc747259495e35592f8a06ae00969964f5f34f72896f3f
SHA51268098c1342f87939b3f57cd3e3a799ff316d2f1eb5c52f8d9c0c9e7c214281bff68a1260a91527b7175ad031798f42125cf9ee2e0d49772eb03b5836b67d9fbf
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\license.html
Filesize6KB
MD5657eb3527d651515f97b960a67d19fda
SHA127404b587183bc2f3b3b6919fbb91892f505b60d
SHA256f301745232a72d84f277980ad53b65d94b02479369e8b73fe0e6717adcf11a35
SHA5121085550a8844de081a216bd864990e56fbe91498fb6186cce435173ab73e29932e7b8182078cd2876039addbdb7e3c9769d7d7923f7ed2a5422e6a2a36321b70
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\epl-v10.html
Filesize12KB
MD5cdea5d1cccee27144519c75bcf3015bd
SHA1c36862abb1ada006b3dd4c28adc8b393a92fd325
SHA2561184f2316c36648a2d457b602c713d5d5eb980e86e5e8ed388e94a47f8573dbd
SHA5125d0ea1cef2af7111098c19578c42bfdfd7bb00ec3259fe026df6dd867a24f9a94f3299b035235e3cb87b1c9010f0d1be434a08318dae0412e03ecfdb439edfe9
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\license.html
Filesize9KB
MD5bc3e199345ad8ba54e2fe4acad95433d
SHA1c93cb69c27e1c03069de3c952534a52f391e3fb9
SHA256462c197c83ee3d677b07fe000b2c4e64ac4be4ceaaea80c1c77a5e67d832edd8
SHA512c1941c9106ff0d665dfee1888afcdc3c54e4db8fdb11e3313cd92a147a1084264dba8f1f9cbac5216d3c5ce1f97ff7f8d7d7493826ec3538d5db57a933fe32e4
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\about.html
Filesize14KB
MD559e4add1732aef6b8e228ecfb880c299
SHA131a6380e878f89ec9d2c83716fe42faafdd828db
SHA256089aaccbf4c17d2a0163f13820e926f8ce3122c9ed87e7e040a77439795b8fc4
SHA512461240638f98f92a0df94a6a76470d7ed3a9bf45f845b545ff37355efd4fb3efdbe592e563b6624d2e42374a3bf7682a572c3bfd96c21be87fc96ec3b3bcfbaf
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\about.html
Filesize16KB
MD526986f79440b7a706b65724e509f009f
SHA19d8ff0beef1c19fbecd28e3f632101acf3d02599
SHA256e59b7fa34b947d5ada478ff17543204251955052fdace284e5a285bd2abec5d1
SHA5122c240c4f7b8912bd5049bef22c2507c7c1af15432c860549d0f1ea35f03183270eb7315607fdf35be86703a61ec0ed7801e9e6ea627a026dbf93d98ff11d2ed6
-
Filesize
1KB
MD588c5c5706d2e237422eda18490dc6a59
SHA1bb8d12375f6b995301e756de2ef4fa3a3f6efd39
SHA2564756a234ed3d61fe187d9b6140792e54e7b757545edff82df594a507e528ed8e
SHA512a417270a0d46de5bb06a621c0383c893042a506524713f89ba55567df6e5c3ac8b198bce5a0300ec6e716897bb53fd3e8289a51240157dc743004517673d4ab7
-
Filesize
833KB
MD54a87a4d6677558706db4afaeeeb58d20
SHA17738dc6a459f8415f0265d36c626b48202cd6764
SHA25608b55f9b7dafc53dfc43f7f70cdd7048d231767745b76dc4474370fb323d7ae7
SHA512bedd8ed4975df3fcd4a0f575d6f38e3841e7a4b771baac4f72033102a070818b8539eb101c50563d89d4f3454899a1cedb33047b02e421256dedf9aaf258b594
-
Filesize
81KB
MD55b2329b5552e9bbf279e06010d3a9096
SHA116eef89e96af2cae61dbb400b4b80bcce35b4066
SHA2565fce7856744733c29b85e2afe98492bd439a05c8529be74ba91a08bbc2ab941f
SHA512d1cb6242236fd218363c9119dc52847296a2eacfcf9972f384e3be0fb0bd2e6b7e1ab96748e9fd0781ef035090b8fe02998d61f91d7e0df6db08107f6d77c5f0