Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
12-09-2020 01:31
Static task
static1
Behavioral task
behavioral1
Sample
MediaCreationTool1909.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
MediaCreationTool1909.exe
Resource
win10v200722
General
-
Target
MediaCreationTool1909.exe
-
Size
18.4MB
-
MD5
d0ba2b1c91124ee4a250c6c53f545f1f
-
SHA1
0352292fc21c8dd442358f2ff4fa8eded01b7dca
-
SHA256
8237794f0fffb298040ed59045b679579fa6e1b66703ec2bf5353e71499c663e
-
SHA512
99d45e22f36f15777e789e54d6a5410a335bd344d009d863afd3c35ce53a6f4811b7e40f912b6da35725e121fff11e51a3fb9659a45a2f7701afc9ab407d7399
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
SetupHost.ExeDiagTrackRunner.exepid process 276 SetupHost.Exe 1220 DiagTrackRunner.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
SetupHost.Exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Control Panel\International\Geo\Nation SetupHost.Exe -
Loads dropped DLL 19 IoCs
Processes:
MediaCreationTool1909.exeSetupHost.ExeDiagTrackRunner.exepid process 1132 MediaCreationTool1909.exe 276 SetupHost.Exe 276 SetupHost.Exe 276 SetupHost.Exe 276 SetupHost.Exe 276 SetupHost.Exe 276 SetupHost.Exe 276 SetupHost.Exe 276 SetupHost.Exe 276 SetupHost.Exe 276 SetupHost.Exe 276 SetupHost.Exe 276 SetupHost.Exe 276 SetupHost.Exe 276 SetupHost.Exe 276 SetupHost.Exe 276 SetupHost.Exe 276 SetupHost.Exe 1220 DiagTrackRunner.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
IEXPLORE.EXEdescription ioc process File opened (read-only) \??\H: IEXPLORE.EXE File opened (read-only) \??\V: IEXPLORE.EXE File opened (read-only) \??\X: IEXPLORE.EXE File opened (read-only) \??\Y: IEXPLORE.EXE File opened (read-only) \??\A: IEXPLORE.EXE File opened (read-only) \??\S: IEXPLORE.EXE File opened (read-only) \??\U: IEXPLORE.EXE File opened (read-only) \??\P: IEXPLORE.EXE File opened (read-only) \??\J: IEXPLORE.EXE File opened (read-only) \??\M: IEXPLORE.EXE File opened (read-only) \??\N: IEXPLORE.EXE File opened (read-only) \??\T: IEXPLORE.EXE File opened (read-only) \??\W: IEXPLORE.EXE File opened (read-only) \??\B: IEXPLORE.EXE File opened (read-only) \??\F: IEXPLORE.EXE File opened (read-only) \??\G: IEXPLORE.EXE File opened (read-only) \??\I: IEXPLORE.EXE File opened (read-only) \??\K: IEXPLORE.EXE File opened (read-only) \??\L: IEXPLORE.EXE File opened (read-only) \??\O: IEXPLORE.EXE File opened (read-only) \??\Q: IEXPLORE.EXE File opened (read-only) \??\E: IEXPLORE.EXE File opened (read-only) \??\Z: IEXPLORE.EXE File opened (read-only) \??\R: IEXPLORE.EXE -
JavaScript code in executable 4 IoCs
Processes:
resource yara_rule C:\$Windows.~WS\Sources\SetupPlatform.dll js \$Windows.~WS\Sources\setupplatform.dll js \$Windows.~WS\Sources\setupplatform.dll js \$Windows.~WS\Sources\setupplatform.dll js -
Modifies service 2 TTPs 2 IoCs
Processes:
ipconfig.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NapAgent\Shas ipconfig.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NapAgent\Qecs ipconfig.exe -
Drops file in Windows directory 1 IoCs
Processes:
MediaCreationTool1909.exedescription ioc process File opened for modification C:\Windows\Logs\MoSetup\BlueBox.log MediaCreationTool1909.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
DiagTrackRunner.exeSetupHost.Exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz DiagTrackRunner.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SetupHost.Exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SetupHost.Exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 DiagTrackRunner.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeNETSTAT.EXEpid process 1496 ipconfig.exe 1584 NETSTAT.EXE -
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.microsoft.com\ = "61" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c74411a588d601 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "61" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DOMStorage\microsoft.com\Total = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\Main\WebCryptoData = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000afa7ebbdddfaf246b0bcadcfc4a6daff000000004a000000430044003100430043003200360035002d0030004400410030002d0034003200330030002d0038003400310039002d00430042003600460038003000380046004500360038003800000010660000000100002000000015a3b6d78bb08a8a7d6ea7dc448b054bfa83b23f2ccf2e423860118f66e56bcc000000000e8000000002000020000000808bd4b2c92440204554f0edf0576a7d3da0ebc1e4f476f273b848bbf7b595a5300000009ccc832e78b8fdd00c7753d70c6160594f56fe1c3414d51cc3ab6126f9386b007fe606aca5a4dd6061c7341879965a574000000076517f51bd215d2b49da24548270b164e75d186d62a0b60d59395b6413c22674246eb53242dfbf29d3b8ccaefe7efb0115971b555716d15d1cdd8866fa6ab911 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "306639515" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.microsoft.com\ = "124" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.microsoft.com\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DOMStorage\microsoft.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.microsoft.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DOMStorage\microsoft.com\Total = "124" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "122" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DOMStorage\vlscppe.microsoft.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "124" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000afa7ebbdddfaf246b0bcadcfc4a6daff00000000020000000000106600000001000020000000a64d0a4e45c6464ede401d600153bd7d57b1d358594f1772c435c821562dee83000000000e800000000200002000000051cc348d36a386ac9a768662d5997184ec72f249d4797e8c96a7dcf21d71d3cb2000000075222af4c9dadc983c32ede60f5e9cb8b9d14dfdc4df4f7f72b471940bdff4c140000000e1207a1e614dca1f244623d33a36d114eb266b8b544613262671294e81f152261f21431dfa642b4c017fe3f9c472d1f2e627ee57d45a1dc80fc3ba3f72aa8eaa iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DOMStorage\microsoft.com\NumberOfSubdomains = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DOMStorage\vlscppe.microsoft.com\ = "61" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DOMStorage\microsoft.com\Total = "122" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DOMStorage\microsoft.com\Total = "61" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{443D3041-F498-11EA-B63E-5EC352F1156D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\DOMStorage\microsoft.com\NumberOfSubdomains = "1" IEXPLORE.EXE -
NTFS ADS 1 IoCs
Processes:
SetupHost.Exedescription ioc process File created C:\ProgramData\Microsoft\Diagnosis\ETLLogs\DlTel-Merge.etl:$ETLUNIQUECVDATA SetupHost.Exe -
Runs ping.exe 1 TTPs 3 IoCs
Processes:
PING.EXEPING.EXEPING.EXEpid process 300 PING.EXE 1456 PING.EXE 2020 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SetupHost.Exepid process 276 SetupHost.Exe 276 SetupHost.Exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
Processes:
7zG.exeMediaCreationTool1909.exeSetupHost.ExeDiagTrackRunner.exeNETSTAT.EXEdescription pid process Token: SeRestorePrivilege 1612 7zG.exe Token: 35 1612 7zG.exe Token: SeSecurityPrivilege 1612 7zG.exe Token: SeBackupPrivilege 1132 MediaCreationTool1909.exe Token: SeRestorePrivilege 1132 MediaCreationTool1909.exe Token: SeBackupPrivilege 1132 MediaCreationTool1909.exe Token: SeRestorePrivilege 1132 MediaCreationTool1909.exe Token: SeBackupPrivilege 276 SetupHost.Exe Token: SeRestorePrivilege 276 SetupHost.Exe Token: SeSecurityPrivilege 1612 7zG.exe Token: SeBackupPrivilege 276 SetupHost.Exe Token: SeRestorePrivilege 276 SetupHost.Exe Token: SeDebugPrivilege 1220 DiagTrackRunner.exe Token: SeDebugPrivilege 1220 DiagTrackRunner.exe Token: SeDebugPrivilege 1220 DiagTrackRunner.exe Token: SeDebugPrivilege 1220 DiagTrackRunner.exe Token: SeBackupPrivilege 1132 MediaCreationTool1909.exe Token: SeRestorePrivilege 1132 MediaCreationTool1909.exe Token: SeDebugPrivilege 1584 NETSTAT.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
7zG.exeiexplore.exepid process 1612 7zG.exe 1172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
MediaCreationTool1909.exeSetupHost.Exeiexplore.exeIEXPLORE.EXEpid process 1132 MediaCreationTool1909.exe 276 SetupHost.Exe 1172 iexplore.exe 1172 iexplore.exe 596 IEXPLORE.EXE 596 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
MediaCreationTool1909.exeSetupHost.Exeiexplore.execmd.exedescription pid process target process PID 1132 wrote to memory of 276 1132 MediaCreationTool1909.exe SetupHost.Exe PID 1132 wrote to memory of 276 1132 MediaCreationTool1909.exe SetupHost.Exe PID 1132 wrote to memory of 276 1132 MediaCreationTool1909.exe SetupHost.Exe PID 1132 wrote to memory of 276 1132 MediaCreationTool1909.exe SetupHost.Exe PID 1132 wrote to memory of 276 1132 MediaCreationTool1909.exe SetupHost.Exe PID 1132 wrote to memory of 276 1132 MediaCreationTool1909.exe SetupHost.Exe PID 1132 wrote to memory of 276 1132 MediaCreationTool1909.exe SetupHost.Exe PID 276 wrote to memory of 1220 276 SetupHost.Exe DiagTrackRunner.exe PID 276 wrote to memory of 1220 276 SetupHost.Exe DiagTrackRunner.exe PID 276 wrote to memory of 1220 276 SetupHost.Exe DiagTrackRunner.exe PID 276 wrote to memory of 1220 276 SetupHost.Exe DiagTrackRunner.exe PID 1172 wrote to memory of 596 1172 iexplore.exe IEXPLORE.EXE PID 1172 wrote to memory of 596 1172 iexplore.exe IEXPLORE.EXE PID 1172 wrote to memory of 596 1172 iexplore.exe IEXPLORE.EXE PID 1172 wrote to memory of 596 1172 iexplore.exe IEXPLORE.EXE PID 1144 wrote to memory of 300 1144 cmd.exe PING.EXE PID 1144 wrote to memory of 300 1144 cmd.exe PING.EXE PID 1144 wrote to memory of 300 1144 cmd.exe PING.EXE PID 1144 wrote to memory of 1496 1144 cmd.exe ipconfig.exe PID 1144 wrote to memory of 1496 1144 cmd.exe ipconfig.exe PID 1144 wrote to memory of 1496 1144 cmd.exe ipconfig.exe PID 1144 wrote to memory of 1584 1144 cmd.exe NETSTAT.EXE PID 1144 wrote to memory of 1584 1144 cmd.exe NETSTAT.EXE PID 1144 wrote to memory of 1584 1144 cmd.exe NETSTAT.EXE PID 1144 wrote to memory of 1456 1144 cmd.exe PING.EXE PID 1144 wrote to memory of 1456 1144 cmd.exe PING.EXE PID 1144 wrote to memory of 1456 1144 cmd.exe PING.EXE PID 1144 wrote to memory of 2020 1144 cmd.exe PING.EXE PID 1144 wrote to memory of 2020 1144 cmd.exe PING.EXE PID 1144 wrote to memory of 2020 1144 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\MediaCreationTool1909.exe"C:\Users\Admin\AppData\Local\Temp\MediaCreationTool1909.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\$Windows.~WS\Sources\SetupHost.Exe"C:\$Windows.~WS\Sources\SetupHost.Exe" /Download /Web2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:276 -
C:\$Windows.~WS\Sources\DiagTrackRunner.exeC:\$Windows.~WS\Sources\DiagTrackRunner.exe /UploadEtlFilesOnly3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\UninstallWatch\" -ad -an -ai#7zMap6999:86:7zEvent175651⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1612
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2000
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:868
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://go.microsoft.com/fwlink/?LinkId=7242951⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1172 CREDAT:275457 /prefetch:22⤵
- Enumerates connected drives
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:596
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\system32\PING.EXEping www.alienvault.com2⤵
- Runs ping.exe
PID:300
-
-
C:\Windows\system32\ipconfig.exeipconfig /all2⤵
- Modifies service
- Gathers network information
PID:1496
-
-
C:\Windows\system32\NETSTAT.EXEnetstat -a -n -o2⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\Windows\system32\PING.EXEping www.fbi.gov2⤵
- Runs ping.exe
PID:1456
-
-
C:\Windows\system32\PING.EXEping www.reddit.com2⤵
- Runs ping.exe
PID:2020
-