Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
128s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
12/04/2021, 06:37
Static task
static1
Behavioral task
behavioral1
Sample
C++ Dropper.exe
Resource
win7v20201028
General
-
Target
C++ Dropper.exe
-
Size
18KB
-
MD5
356dc1680475998c7c23e199f2c2e9ca
-
SHA1
8eadece945d635093c04a9d871ea0ead59d8e89f
-
SHA256
e5990480cda6207bf008957ae5a3fa3debe6303fd19c3babc3f2223bf769479c
-
SHA512
ea11d80221f730b0517f80350b474eb790109add96aff70af618dec1d8ee270a5ab8d42f2cf12becf02dfdcbbdeb48c4d339151f055945b802e9f0d88179b7dc
Malware Config
Extracted
raccoon
f55f17175de492dccaffeb57cb41e8ca951c34c4
-
url4cnc
https://tttttt.me/umiumitfr3
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2308 created 2832 2308 svchost.exe 82 -
Executes dropped EXE 13 IoCs
pid Process 3240 helperlGeku21yEAQznpjDO6g5xZNU3T0VRtwP.exe 940 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe 1404 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe 3436 helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe 1584 helper0cVYrD98QSUz7fXTdMEG4bK2yBpPNva3.exe 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 2832 helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe 1576 helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe 1216 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe 3252 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe 4040 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 892 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 2888 helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe -
resource yara_rule behavioral2/files/0x000100000001ab61-157.dat upx behavioral2/files/0x000100000001ab61-155.dat upx behavioral2/files/0x000100000001ab61-174.dat upx -
Loads dropped DLL 5 IoCs
pid Process 2888 helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe 2888 helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe 2888 helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe 2888 helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe 2888 helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 39 api.ipify.org -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 940 set thread context of 1216 940 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe 96 PID 1404 set thread context of 3252 1404 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe 97 PID 3552 set thread context of 892 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 99 PID 3436 set thread context of 2888 3436 helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4060 timeout.exe -
Kills process with taskkill 2 IoCs
pid Process 1576 taskkill.exe 2360 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C++ Dropper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C++ Dropper.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2832 helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe 2832 helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 892 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 892 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 1216 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe 1216 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe 3252 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe 3252 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1576 taskkill.exe Token: SeDebugPrivilege 2360 taskkill.exe Token: SeDebugPrivilege 2832 helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Token: SeImpersonatePrivilege 2832 helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Token: SeTcbPrivilege 2308 svchost.exe Token: SeTcbPrivilege 2308 svchost.exe Token: SeDebugPrivilege 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe Token: SeDebugPrivilege 1216 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe Token: SeDebugPrivilege 3252 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 412 wrote to memory of 3240 412 C++ Dropper.exe 76 PID 412 wrote to memory of 3240 412 C++ Dropper.exe 76 PID 412 wrote to memory of 3240 412 C++ Dropper.exe 76 PID 412 wrote to memory of 940 412 C++ Dropper.exe 77 PID 412 wrote to memory of 940 412 C++ Dropper.exe 77 PID 412 wrote to memory of 940 412 C++ Dropper.exe 77 PID 412 wrote to memory of 1404 412 C++ Dropper.exe 78 PID 412 wrote to memory of 1404 412 C++ Dropper.exe 78 PID 412 wrote to memory of 1404 412 C++ Dropper.exe 78 PID 412 wrote to memory of 3436 412 C++ Dropper.exe 79 PID 412 wrote to memory of 3436 412 C++ Dropper.exe 79 PID 412 wrote to memory of 3436 412 C++ Dropper.exe 79 PID 412 wrote to memory of 1584 412 C++ Dropper.exe 80 PID 412 wrote to memory of 1584 412 C++ Dropper.exe 80 PID 412 wrote to memory of 1584 412 C++ Dropper.exe 80 PID 412 wrote to memory of 3552 412 C++ Dropper.exe 81 PID 412 wrote to memory of 3552 412 C++ Dropper.exe 81 PID 412 wrote to memory of 3552 412 C++ Dropper.exe 81 PID 412 wrote to memory of 2832 412 C++ Dropper.exe 82 PID 412 wrote to memory of 2832 412 C++ Dropper.exe 82 PID 412 wrote to memory of 2832 412 C++ Dropper.exe 82 PID 3240 wrote to memory of 3996 3240 helperlGeku21yEAQznpjDO6g5xZNU3T0VRtwP.exe 83 PID 3240 wrote to memory of 3996 3240 helperlGeku21yEAQznpjDO6g5xZNU3T0VRtwP.exe 83 PID 3240 wrote to memory of 3996 3240 helperlGeku21yEAQznpjDO6g5xZNU3T0VRtwP.exe 83 PID 3996 wrote to memory of 1576 3996 cmd.exe 85 PID 3996 wrote to memory of 1576 3996 cmd.exe 85 PID 3996 wrote to memory of 1576 3996 cmd.exe 85 PID 1584 wrote to memory of 4044 1584 helper0cVYrD98QSUz7fXTdMEG4bK2yBpPNva3.exe 90 PID 1584 wrote to memory of 4044 1584 helper0cVYrD98QSUz7fXTdMEG4bK2yBpPNva3.exe 90 PID 1584 wrote to memory of 4044 1584 helper0cVYrD98QSUz7fXTdMEG4bK2yBpPNva3.exe 90 PID 4044 wrote to memory of 2360 4044 cmd.exe 92 PID 4044 wrote to memory of 2360 4044 cmd.exe 92 PID 4044 wrote to memory of 2360 4044 cmd.exe 92 PID 2308 wrote to memory of 1576 2308 svchost.exe 95 PID 2308 wrote to memory of 1576 2308 svchost.exe 95 PID 2308 wrote to memory of 1576 2308 svchost.exe 95 PID 940 wrote to memory of 1216 940 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe 96 PID 940 wrote to memory of 1216 940 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe 96 PID 940 wrote to memory of 1216 940 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe 96 PID 940 wrote to memory of 1216 940 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe 96 PID 940 wrote to memory of 1216 940 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe 96 PID 940 wrote to memory of 1216 940 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe 96 PID 940 wrote to memory of 1216 940 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe 96 PID 940 wrote to memory of 1216 940 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe 96 PID 1404 wrote to memory of 3252 1404 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe 97 PID 1404 wrote to memory of 3252 1404 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe 97 PID 1404 wrote to memory of 3252 1404 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe 97 PID 1404 wrote to memory of 3252 1404 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe 97 PID 1404 wrote to memory of 3252 1404 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe 97 PID 1404 wrote to memory of 3252 1404 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe 97 PID 1404 wrote to memory of 3252 1404 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe 97 PID 1404 wrote to memory of 3252 1404 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe 97 PID 3552 wrote to memory of 4040 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 98 PID 3552 wrote to memory of 4040 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 98 PID 3552 wrote to memory of 4040 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 98 PID 3552 wrote to memory of 892 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 99 PID 3552 wrote to memory of 892 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 99 PID 3552 wrote to memory of 892 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 99 PID 3552 wrote to memory of 892 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 99 PID 3552 wrote to memory of 892 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 99 PID 3552 wrote to memory of 892 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 99 PID 3552 wrote to memory of 892 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 99 PID 3552 wrote to memory of 892 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 99 PID 3552 wrote to memory of 892 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\C++ Dropper.exe"C:\Users\Admin\AppData\Local\Temp\C++ Dropper.exe"1⤵
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\helperlGeku21yEAQznpjDO6g5xZNU3T0VRtwP.exe"C:\Users\Admin\AppData\Local\Temp\helperlGeku21yEAQznpjDO6g5xZNU3T0VRtwP.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "helperlGeku21yEAQznpjDO6g5xZNU3T0VRtwP.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\helperlGeku21yEAQznpjDO6g5xZNU3T0VRtwP.exe" & exit3⤵
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "helperlGeku21yEAQznpjDO6g5xZNU3T0VRtwP.exe" /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe"C:\Users\Admin\AppData\Local\Temp\helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe"{path}"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1216
-
-
-
C:\Users\Admin\AppData\Local\Temp\helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe"C:\Users\Admin\AppData\Local\Temp\helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe"{path}"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
-
C:\Users\Admin\AppData\Local\Temp\helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe"C:\Users\Admin\AppData\Local\Temp\helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe"C:\Users\Admin\AppData\Local\Temp\helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2888 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe"4⤵PID:1324
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:4060
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\helper0cVYrD98QSUz7fXTdMEG4bK2yBpPNva3.exe"C:\Users\Admin\AppData\Local\Temp\helper0cVYrD98QSUz7fXTdMEG4bK2yBpPNva3.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "helper0cVYrD98QSUz7fXTdMEG4bK2yBpPNva3.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\helper0cVYrD98QSUz7fXTdMEG4bK2yBpPNva3.exe" & exit3⤵
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "helper0cVYrD98QSUz7fXTdMEG4bK2yBpPNva3.exe" /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe"C:\Users\Admin\AppData\Local\Temp\helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe"{path}"3⤵
- Executes dropped EXE
PID:4040
-
-
C:\Users\Admin\AppData\Local\Temp\helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe"{path}"3⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:892
-
-
-
C:\Users\Admin\AppData\Local\Temp\helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe"C:\Users\Admin\AppData\Local\Temp\helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe"C:\Users\Admin\AppData\Local\Temp\helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe"3⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Modifies system certificate store
PID:1576
-
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2308