Analysis
-
max time kernel
27s -
max time network
102s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
28-02-2021 07:18
Static task
static1
Behavioral task
behavioral1
Sample
162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe
-
Size
1.3MB
-
MD5
51fd05fa1ff6631a2eb929677e0156e1
-
SHA1
a21e07517c61d11c3bf85768e77981f591fe6f75
-
SHA256
162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4
-
SHA512
2cc92cd023295ca62333f5de64d3360800363c690b0f9707e50ffe3d696c2a429a57088f1293eff34b315ce6f7470efbfa870dbc427911bc050b0353fbf06aaa
Score
8/10
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall 1 TTPs
-
Drops desktop.ini file(s) 7 IoCs
Processes:
162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exedescription ioc process File opened for modification C:\Program Files\desktop.ini 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File created C:\Program Files\desktop.ini 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Desktop.ini 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File created C:\Program Files\Common Files\microsoft shared\Stationery\Desktop.ini 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3341490333-719741536-2920803124-1000\desktop.ini 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File created C:\$Recycle.Bin\S-1-5-21-3341490333-719741536-2920803124-1000\desktop.ini 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe -
Drops file in Program Files directory 64 IoCs
Processes:
162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.app_1.0.300.v20140228-1829.jar 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\SQLiteWrapper.winmd 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2017.125.40.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.contrast-white_targetsize-32.png 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\C2R64.dll 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File created C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_ja_JP.jar.[Openfileyou@protonmail.com][MJ-WP5283196407].Snoopdogg 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Awards\challenge\Become_a_Star_.png 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Themes\Aquarium\mask\12d.png 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\4665_20x20x32.png 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\derby_common.bat 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-loaders_zh_CN.jar 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-3102-0000-1000-0000000FF1CE.xml 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Messaging_3.26.24002.0_neutral_split.scale-150_8wekyb3d8bbwe\Assets\toast.scale-150.png 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.Excel.ReportingServices.QueryDesigners.Extensions.dll 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\ECLIPSE_.SF.[Openfileyou@protonmail.com][MJ-WP5283196407].Snoopdogg 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_25.25.13009.0_neutral_split.scale-200_8wekyb3d8bbwe\AppxBlockMap.xml 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\w2k_lsa_auth.dll 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\libspeex_plugin.dll.[Openfileyou@protonmail.com][MJ-WP5283196407].Snoopdogg 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Microsoft Office\FileSystemMetadata.xml 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File created C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\GostTitle.XSL.[Openfileyou@protonmail.com][MJ-WP5283196407].Snoopdogg 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\small\gw_16x11.png 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\osf\agavedefaulticon96x96.png 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Mozilla Firefox\softokn3.dll.[Openfileyou@protonmail.com][MJ-WP5283196407].Snoopdogg 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WEBSANDBOX.DLL 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\Weather_LogoSmall.scale-100.png 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Arkadium.Win10.DailyChallenges\Assets\particles.png 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\System\ole db\xmlrw.dll.[Openfileyou@protonmail.com][MJ-WP5283196407].Snoopdogg 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ui.nl_ja_4.4.0.v20140623020002.jar.[Openfileyou@protonmail.com][MJ-WP5283196407].Snoopdogg 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Messaging_3.26.24002.0_x64__8wekyb3d8bbwe\Microsoft.Graphics.Canvas.winmd 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Tournament\ShowLeaderboardButton.png 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\plugin.jar.[Openfileyou@protonmail.com][MJ-WP5283196407].Snoopdogg 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-ui_ja.jar 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\dcpr.dll.[Openfileyou@protonmail.com][MJ-WP5283196407].Snoopdogg 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-core-output2.xml.[Openfileyou@protonmail.com][MJ-WP5283196407].Snoopdogg 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\69_40x40x32.png 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_11.19.19003.0_x64__8wekyb3d8bbwe\AppxManifest.xml 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\classes.jsa 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp6-ul-oob.xrm-ms 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\AugLoop\bundle.js.[Openfileyou@protonmail.com][MJ-WP5283196407].Snoopdogg 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_4.5.6.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-36.png 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1612.10312.0_x64__8wekyb3d8bbwe\AppxSignature.p7x 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-core-startup.xml.[Openfileyou@protonmail.com][MJ-WP5283196407].Snoopdogg 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-selector-api.xml 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\THIRDPARTYLICENSEREADME.txt.[Openfileyou@protonmail.com][MJ-WP5283196407].Snoopdogg 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.dcfmui.msi.16.en-us.xml 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PROOF\msth8FR.LEX 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sr\LC_MESSAGES\vlc.mo 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.contrast-black_scale-80.png 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\HxMail.exe 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.10252.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxBlockMap.xml 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-applemenu_zh_CN.jar.[Openfileyou@protonmail.com][MJ-WP5283196407].Snoopdogg 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\AppxMetadata\CodeIntegrity.cat 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt.[Openfileyou@protonmail.com][MJ-WP5283196407].Snoopdogg 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProO365R_Subscription-ppd.xrm-ms 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\dcf.x-none.msi.16.x-none.boot.tree.dat 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.AnalysisServices.XLHost.Modeler.dll.[Openfileyou@protonmail.com][MJ-WP5283196407].Snoopdogg 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.ReportingServices.RsClient.dll.[Openfileyou@protonmail.com][MJ-WP5283196407].Snoopdogg 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\8.png 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\ThemeCreation\lobby_deck_style_mobile.png 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\SurfaceProfiles\canvas12oz_512x512_nm.png 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WatchRepair.vstm.[Openfileyou@protonmail.com][MJ-WP5283196407].Snoopdogg 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File created C:\Program Files\Microsoft Office\root\Office16\MSOHEV.DLL.[Openfileyou@protonmail.com][MJ-WP5283196407].Snoopdogg 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\EduWorks Data Streamer Add-In\Microsoft.Office.Tools.Excel.dll 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\MapsMedTile.scale-100.png 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe -
NTFS ADS 2 IoCs
Processes:
162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exedescription ioc process File opened for modification C:\Documents and Settings\zh-TW\8:뜠Öͥt.ex 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe File opened for modification C:\Documents and Settings\zh-TW\8:㯠Út.ex 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exepid process 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.execmd.exenet.execmd.exenet.execmd.exenet.execmd.exenet.execmd.execmd.execmd.exenet.exedescription pid process target process PID 4804 wrote to memory of 5076 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 4804 wrote to memory of 5076 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 4804 wrote to memory of 5076 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 5076 wrote to memory of 4252 5076 cmd.exe net.exe PID 5076 wrote to memory of 4252 5076 cmd.exe net.exe PID 5076 wrote to memory of 4252 5076 cmd.exe net.exe PID 4252 wrote to memory of 3420 4252 net.exe net1.exe PID 4252 wrote to memory of 3420 4252 net.exe net1.exe PID 4252 wrote to memory of 3420 4252 net.exe net1.exe PID 4804 wrote to memory of 824 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 4804 wrote to memory of 824 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 4804 wrote to memory of 824 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 4804 wrote to memory of 3948 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 4804 wrote to memory of 3948 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 4804 wrote to memory of 3948 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 4804 wrote to memory of 4292 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 4804 wrote to memory of 4292 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 4804 wrote to memory of 4292 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 4804 wrote to memory of 532 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 4804 wrote to memory of 532 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 4804 wrote to memory of 532 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 532 wrote to memory of 940 532 cmd.exe net.exe PID 532 wrote to memory of 940 532 cmd.exe net.exe PID 532 wrote to memory of 940 532 cmd.exe net.exe PID 940 wrote to memory of 652 940 net.exe net1.exe PID 940 wrote to memory of 652 940 net.exe net1.exe PID 940 wrote to memory of 652 940 net.exe net1.exe PID 4804 wrote to memory of 1204 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 4804 wrote to memory of 1204 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 4804 wrote to memory of 1204 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 1204 wrote to memory of 1300 1204 cmd.exe net.exe PID 1204 wrote to memory of 1300 1204 cmd.exe net.exe PID 1204 wrote to memory of 1300 1204 cmd.exe net.exe PID 1300 wrote to memory of 1400 1300 net.exe net1.exe PID 1300 wrote to memory of 1400 1300 net.exe net1.exe PID 1300 wrote to memory of 1400 1300 net.exe net1.exe PID 4804 wrote to memory of 1596 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 4804 wrote to memory of 1596 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 4804 wrote to memory of 1596 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 1596 wrote to memory of 1732 1596 cmd.exe net.exe PID 1596 wrote to memory of 1732 1596 cmd.exe net.exe PID 1596 wrote to memory of 1732 1596 cmd.exe net.exe PID 1732 wrote to memory of 1876 1732 net.exe net1.exe PID 1732 wrote to memory of 1876 1732 net.exe net1.exe PID 1732 wrote to memory of 1876 1732 net.exe net1.exe PID 4804 wrote to memory of 2076 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 4804 wrote to memory of 2076 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 4804 wrote to memory of 2076 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 2076 wrote to memory of 2500 2076 cmd.exe netsh.exe PID 2076 wrote to memory of 2500 2076 cmd.exe netsh.exe PID 2076 wrote to memory of 2500 2076 cmd.exe netsh.exe PID 4804 wrote to memory of 2584 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 4804 wrote to memory of 2584 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 4804 wrote to memory of 2584 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 2584 wrote to memory of 3764 2584 cmd.exe netsh.exe PID 2584 wrote to memory of 3764 2584 cmd.exe netsh.exe PID 2584 wrote to memory of 3764 2584 cmd.exe netsh.exe PID 4804 wrote to memory of 2072 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 4804 wrote to memory of 2072 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 4804 wrote to memory of 2072 4804 162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe cmd.exe PID 2072 wrote to memory of 2200 2072 cmd.exe net.exe PID 2072 wrote to memory of 2200 2072 cmd.exe net.exe PID 2072 wrote to memory of 2200 2072 cmd.exe net.exe PID 2200 wrote to memory of 4440 2200 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe"C:\Users\Admin\AppData\Local\Temp\162c90e6e8a1b019ed7272b16b2307cbbdb0bac09acec116fb6c3619c86794c4.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop MSDTC2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exenet stop MSDTC3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSDTC4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit /set {default} recoveryenabled no2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wbadmin delete catalog -quiet2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop SQLSERVERAGENT2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exenet stop SQLSERVERAGENT3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLSERVERAGENT4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop MSSQLSERVER2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exenet stop MSSQLSERVER3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop vds2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exenet stop vds3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop vds4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall set currentprofile state off2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set currentprofile state off3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh firewall set opmode mode=disable2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop SQLWriter2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exenet stop SQLWriter3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLWriter4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop SQLBrowser2⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLBrowser3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLBrowser4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop MSSQLSERVER2⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQLSERVER3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop MSSQL$CONTOSO12⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$CONTOSO13⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$CONTOSO14⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/220-32-0x0000000000000000-mapping.dmp
-
memory/532-8-0x0000000000000000-mapping.dmp
-
memory/652-10-0x0000000000000000-mapping.dmp
-
memory/824-5-0x0000000000000000-mapping.dmp
-
memory/940-9-0x0000000000000000-mapping.dmp
-
memory/1204-11-0x0000000000000000-mapping.dmp
-
memory/1300-12-0x0000000000000000-mapping.dmp
-
memory/1400-13-0x0000000000000000-mapping.dmp
-
memory/1460-31-0x0000000000000000-mapping.dmp
-
memory/1596-14-0x0000000000000000-mapping.dmp
-
memory/1732-15-0x0000000000000000-mapping.dmp
-
memory/1876-16-0x0000000000000000-mapping.dmp
-
memory/2072-21-0x0000000000000000-mapping.dmp
-
memory/2076-17-0x0000000000000000-mapping.dmp
-
memory/2200-22-0x0000000000000000-mapping.dmp
-
memory/2500-18-0x0000000000000000-mapping.dmp
-
memory/2584-19-0x0000000000000000-mapping.dmp
-
memory/2628-29-0x0000000000000000-mapping.dmp
-
memory/3420-4-0x0000000000000000-mapping.dmp
-
memory/3764-20-0x0000000000000000-mapping.dmp
-
memory/3948-6-0x0000000000000000-mapping.dmp
-
memory/4100-28-0x0000000000000000-mapping.dmp
-
memory/4252-3-0x0000000000000000-mapping.dmp
-
memory/4292-7-0x0000000000000000-mapping.dmp
-
memory/4440-23-0x0000000000000000-mapping.dmp
-
memory/4568-24-0x0000000000000000-mapping.dmp
-
memory/4600-25-0x0000000000000000-mapping.dmp
-
memory/4620-27-0x0000000000000000-mapping.dmp
-
memory/4632-26-0x0000000000000000-mapping.dmp
-
memory/4776-30-0x0000000000000000-mapping.dmp
-
memory/4804-34-0x0000000003460000-0x0000000003461000-memory.dmpFilesize
4KB
-
memory/4804-33-0x0000000002C60000-0x0000000002C61000-memory.dmpFilesize
4KB
-
memory/4804-35-0x0000000002C60000-0x0000000002C61000-memory.dmpFilesize
4KB
-
memory/4804-49-0x0000000002C60000-0x0000000002C61000-memory.dmpFilesize
4KB
-
memory/4804-50-0x0000000003460000-0x0000000003461000-memory.dmpFilesize
4KB
-
memory/5076-2-0x0000000000000000-mapping.dmp