Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
12/12/2020, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe
Resource
win10v20201028
General
-
Target
301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe
-
Size
413KB
-
MD5
3023d7526b479ea3df315a5b1779a43d
-
SHA1
b5ae71b96a28b9353a4f33c5370ac18750937c17
-
SHA256
301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f
-
SHA512
67fe1cf7538e8ef76b6acbba99326af0de58464bf5710ae6fa7b85d73da9a84c58122de6b87c7d9560f0d366de711a95d03be231c1018eacb7489fd32aeb0834
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\ProgramData\\yfcxiw\\lmxoqp.exe,explorer.exe" 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP\Collection svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MpsSvc\Parameters\PortKeywords\DHCP svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1428 bobpd.exe -
Modifies Installed Components in the registry 2 TTPs
-
Deletes itself 1 IoCs
pid Process 1584 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\2wffdyw = "C:\\ProgramData\\ejaqv\\bobpd.exe" 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\2wffdyw = "C:\\ProgramData\\ejaqv\\bobpd.exe" svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\system32\perfc009.dat WMIADAP.EXE File created C:\Windows\system32\perfh009.dat WMIADAP.EXE File created C:\Windows\system32\PerfStringBackup.TMP WMIADAP.EXE File opened for modification C:\Windows\system32\PerfStringBackup.INI WMIADAP.EXE File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-WER-Diag%4Operational.evtx svchost.exe File created C:\Windows\system32\wbem\Performance\WmiApRpl_new.ini WMIADAP.EXE -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\sc_reader.exe Explorer.EXE File created C:\Windows\inf\WmiApRpl\WmiApRpl.h WMIADAP.EXE File opened for modification C:\Windows\inf\WmiApRpl\WmiApRpl.h WMIADAP.EXE File created C:\Windows\inf\WmiApRpl\0009\WmiApRpl.ini WMIADAP.EXE File opened for modification C:\Windows\appcompat\programs\RecentFileCache.bcf svchost.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\SoftwareProtectionPlatform\Cache\cache.dat sppsvc.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe Explorer.EXE -
Program crash 1 IoCs
pid pid_target Process procid_target 548 1256 WerFault.exe 11 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore svchost.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_Classes\Local Settings Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1680 svchost.exe 316 svchost.exe 316 svchost.exe 548 WerFault.exe 548 WerFault.exe 548 WerFault.exe 548 WerFault.exe 548 WerFault.exe 316 svchost.exe 1680 svchost.exe 1972 wmiprvse.exe 1972 wmiprvse.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1980 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1080 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe 1080 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe 316 svchost.exe 316 svchost.exe 1080 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe 1080 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeDebugPrivilege 1680 svchost.exe Token: SeDebugPrivilege 548 WerFault.exe Token: SeAuditPrivilege 884 svchost.exe Token: SeShutdownPrivilege 1980 Explorer.EXE Token: SeAuditPrivilege 280 svchost.exe Token: SeShutdownPrivilege 1980 Explorer.EXE Token: SeShutdownPrivilege 1980 Explorer.EXE Token: SeShutdownPrivilege 1980 Explorer.EXE Token: SeShutdownPrivilege 1980 Explorer.EXE Token: SeShutdownPrivilege 1980 Explorer.EXE Token: SeShutdownPrivilege 1980 Explorer.EXE Token: 33 1552 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1552 AUDIODG.EXE Token: 33 1552 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1552 AUDIODG.EXE Token: SeAuditPrivilege 884 svchost.exe Token: SeAuditPrivilege 884 svchost.exe Token: SeAuditPrivilege 884 svchost.exe Token: SeAuditPrivilege 884 svchost.exe Token: SeAuditPrivilege 884 svchost.exe Token: SeAuditPrivilege 884 svchost.exe Token: SeAuditPrivilege 884 svchost.exe Token: SeAuditPrivilege 884 svchost.exe Token: SeIncBasePriorityPrivilege 884 svchost.exe Token: SeShutdownPrivilege 1980 Explorer.EXE Token: SeShutdownPrivilege 1980 Explorer.EXE Token: SeAuditPrivilege 884 svchost.exe Token: SeAuditPrivilege 280 svchost.exe Token: SeShutdownPrivilege 1980 Explorer.EXE Token: SeShutdownPrivilege 1980 Explorer.EXE Token: SeShutdownPrivilege 1980 Explorer.EXE Token: SeShutdownPrivilege 1980 Explorer.EXE Token: SeShutdownPrivilege 1980 Explorer.EXE Token: SeShutdownPrivilege 1980 Explorer.EXE Token: SeShutdownPrivilege 1980 Explorer.EXE Token: SeShutdownPrivilege 1980 Explorer.EXE Token: SeShutdownPrivilege 1980 Explorer.EXE Token: SeShutdownPrivilege 1980 Explorer.EXE -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 316 svchost.exe 1120 taskhost.exe 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1120 taskhost.exe 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE -
Suspicious use of SendNotifyMessage 87 IoCs
pid Process 316 svchost.exe 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE 1980 Explorer.EXE -
Suspicious use of UnmapMainImage 3 IoCs
pid Process 260 smss.exe 804 svchost.exe 804 svchost.exe -
Suspicious use of WriteProcessMemory 150 IoCs
description pid Process procid_target PID 1080 wrote to memory of 316 1080 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe 29 PID 1080 wrote to memory of 316 1080 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe 29 PID 1080 wrote to memory of 316 1080 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe 29 PID 1080 wrote to memory of 316 1080 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe 29 PID 316 wrote to memory of 1680 316 svchost.exe 30 PID 316 wrote to memory of 1680 316 svchost.exe 30 PID 316 wrote to memory of 1680 316 svchost.exe 30 PID 316 wrote to memory of 1680 316 svchost.exe 30 PID 1680 wrote to memory of 260 1680 svchost.exe 3 PID 1680 wrote to memory of 336 1680 svchost.exe 2 PID 1680 wrote to memory of 372 1680 svchost.exe 1 PID 1680 wrote to memory of 384 1680 svchost.exe 4 PID 1680 wrote to memory of 420 1680 svchost.exe 5 PID 1680 wrote to memory of 464 1680 svchost.exe 6 PID 1680 wrote to memory of 480 1680 svchost.exe 7 PID 1680 wrote to memory of 488 1680 svchost.exe 23 PID 1680 wrote to memory of 588 1680 svchost.exe 22 PID 1680 wrote to memory of 668 1680 svchost.exe 21 PID 1680 wrote to memory of 740 1680 svchost.exe 8 PID 1680 wrote to memory of 804 1680 svchost.exe 20 PID 1680 wrote to memory of 848 1680 svchost.exe 19 PID 1680 wrote to memory of 884 1680 svchost.exe 18 PID 1680 wrote to memory of 280 1680 svchost.exe 16 PID 1680 wrote to memory of 344 1680 svchost.exe 15 PID 1680 wrote to memory of 1044 1680 svchost.exe 14 PID 1680 wrote to memory of 1120 1680 svchost.exe 13 PID 1680 wrote to memory of 1188 1680 svchost.exe 12 PID 1680 wrote to memory of 1256 1680 svchost.exe 11 PID 1680 wrote to memory of 2004 1680 svchost.exe 25 PID 1680 wrote to memory of 1972 1680 svchost.exe 26 PID 1680 wrote to memory of 1720 1680 svchost.exe 27 PID 1680 wrote to memory of 1700 1680 svchost.exe 28 PID 384 wrote to memory of 1152 384 csrss.exe 31 PID 384 wrote to memory of 1152 384 csrss.exe 31 PID 384 wrote to memory of 1152 384 csrss.exe 31 PID 384 wrote to memory of 1152 384 csrss.exe 31 PID 1080 wrote to memory of 1152 1080 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe 31 PID 1080 wrote to memory of 1152 1080 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe 31 PID 1080 wrote to memory of 1152 1080 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe 31 PID 1080 wrote to memory of 1152 1080 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe 31 PID 384 wrote to memory of 1080 384 csrss.exe 24 PID 384 wrote to memory of 1080 384 csrss.exe 24 PID 384 wrote to memory of 1584 384 csrss.exe 32 PID 384 wrote to memory of 1584 384 csrss.exe 32 PID 384 wrote to memory of 1584 384 csrss.exe 32 PID 384 wrote to memory of 1584 384 csrss.exe 32 PID 1080 wrote to memory of 1584 1080 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe 32 PID 1080 wrote to memory of 1584 1080 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe 32 PID 1080 wrote to memory of 1584 1080 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe 32 PID 1080 wrote to memory of 1584 1080 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe 32 PID 384 wrote to memory of 600 384 csrss.exe 33 PID 384 wrote to memory of 600 384 csrss.exe 33 PID 384 wrote to memory of 600 384 csrss.exe 33 PID 384 wrote to memory of 1232 384 csrss.exe 34 PID 384 wrote to memory of 1232 384 csrss.exe 34 PID 384 wrote to memory of 1232 384 csrss.exe 34 PID 384 wrote to memory of 1232 384 csrss.exe 34 PID 1584 wrote to memory of 1232 1584 cmd.exe 34 PID 1584 wrote to memory of 1232 1584 cmd.exe 34 PID 1584 wrote to memory of 1232 1584 cmd.exe 34 PID 1584 wrote to memory of 1232 1584 cmd.exe 34 PID 384 wrote to memory of 548 384 csrss.exe 35 PID 384 wrote to memory of 548 384 csrss.exe 35 PID 1256 wrote to memory of 548 1256 Explorer.EXE 35 PID 1256 wrote to memory of 548 1256 Explorer.EXE 35 PID 1256 wrote to memory of 548 1256 Explorer.EXE 35 PID 384 wrote to memory of 548 384 csrss.exe 35 PID 384 wrote to memory of 548 384 csrss.exe 35 PID 384 wrote to memory of 548 384 csrss.exe 35 PID 384 wrote to memory of 548 384 csrss.exe 35 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 548 wrote to memory of 1980 548 WerFault.exe 36 PID 548 wrote to memory of 1980 548 WerFault.exe 36 PID 548 wrote to memory of 1980 548 WerFault.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1428 384 csrss.exe 37 PID 384 wrote to memory of 1428 384 csrss.exe 37 PID 384 wrote to memory of 1428 384 csrss.exe 37 PID 384 wrote to memory of 1428 384 csrss.exe 37 PID 1980 wrote to memory of 1428 1980 Explorer.EXE 37 PID 1980 wrote to memory of 1428 1980 Explorer.EXE 37 PID 1980 wrote to memory of 1428 1980 Explorer.EXE 37 PID 1980 wrote to memory of 1428 1980 Explorer.EXE 37 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 336 wrote to memory of 1528 336 csrss.exe 39 PID 588 wrote to memory of 1528 588 svchost.exe 39 PID 588 wrote to memory of 1528 588 svchost.exe 39 PID 588 wrote to memory of 1528 588 svchost.exe 39 PID 384 wrote to memory of 1528 384 csrss.exe 39 PID 384 wrote to memory of 1528 384 csrss.exe 39 PID 316 wrote to memory of 1980 316 svchost.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 480 wrote to memory of 1980 480 lsass.exe 36 PID 480 wrote to memory of 1980 480 lsass.exe 36 PID 480 wrote to memory of 1980 480 lsass.exe 36 PID 480 wrote to memory of 1980 480 lsass.exe 36 PID 480 wrote to memory of 1980 480 lsass.exe 36 PID 480 wrote to memory of 1980 480 lsass.exe 36 PID 480 wrote to memory of 1980 480 lsass.exe 36 PID 480 wrote to memory of 1980 480 lsass.exe 36 PID 480 wrote to memory of 1980 480 lsass.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 PID 384 wrote to memory of 1980 384 csrss.exe 36 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1232 attrib.exe
Processes
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:372
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:464
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵
- Modifies security service
- Drops file in System32 directory
- Modifies Internet Explorer settings
PID:740 -
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4544⤵
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵
- Suspicious use of FindShellTrayWindow
PID:1120
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1044
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:344
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵
- Suspicious use of AdjustPrivilegeToken
PID:280
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:884 -
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:2004
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:848
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵
- Suspicious use of UnmapMainImage
PID:804
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:668
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:588
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding4⤵
- Suspicious behavior: EnumeratesProcesses
PID:1972
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}4⤵PID:1528
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:1720
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵
- Drops file in Windows directory
PID:1700
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:480
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:488
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:336
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵
- Suspicious use of UnmapMainImage
PID:260
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-19469759681828169204475764091889446052-13638994091282863585-8226182722046354872"2⤵PID:600
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe"C:\Users\Admin\AppData\Local\Temp\301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe"2⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680
-
-
-
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:1152
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\J8Oqe3qMF.bat" 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe4⤵
- Views/modifies file attributes
PID:1232
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1256 -s 14882⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:548 -
C:\Windows\Explorer.EXE"C:\Windows\Explorer.EXE"3⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1980 -
C:\ProgramData\ejaqv\bobpd.exe"C:\ProgramData\ejaqv\bobpd.exe"4⤵
- Executes dropped EXE
PID:1428
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1188