Overview
overview
10Static
static
047c2a3d21...d8.exe
windows7_x64
1047c2a3d21...d8.exe
windows10_x64
10187449ec20...d7.exe
windows7_x64
10187449ec20...d7.exe
windows10_x64
101c222584ed...53.exe
windows7_x64
11c222584ed...53.exe
windows10_x64
102b91b538f8...da.exe
windows7_x64
102b91b538f8...da.exe
windows10_x64
105a51cd8463...f8.exe
windows7_x64
105a51cd8463...f8.exe
windows10_x64
10684f7a9558...ab.exe
windows7_x64
1684f7a9558...ab.exe
windows10_x64
16a784913e5...a2.exe
windows7_x64
106a784913e5...a2.exe
windows10_x64
1097a7a92b88...f7.exe
windows7_x64
197a7a92b88...f7.exe
windows10_x64
10aeddc10ec9...12.exe
windows7_x64
10aeddc10ec9...12.exe
windows10_x64
10d1c5f5fb1a...f8.exe
windows7_x64
1d1c5f5fb1a...f8.exe
windows10_x64
10Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
20-04-2021 10:20
Static task
static1
Behavioral task
behavioral1
Sample
047c2a3d2157d2ee24ebe9b9b74148c1e4e29a3eacf1d1145faf785361afb4d8.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
047c2a3d2157d2ee24ebe9b9b74148c1e4e29a3eacf1d1145faf785361afb4d8.exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
187449ec20d9ad83a5d62f78d7eb090a04950ce4b5ec635ed0cf8748d23689d7.exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
187449ec20d9ad83a5d62f78d7eb090a04950ce4b5ec635ed0cf8748d23689d7.exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe
Resource
win10v20210410
Behavioral task
behavioral7
Sample
2b91b538f8fa67a38ef97641ce192ce737b0f2e13480c83ad666f3fa3e82f3da.exe
Resource
win7v20210410
Behavioral task
behavioral8
Sample
2b91b538f8fa67a38ef97641ce192ce737b0f2e13480c83ad666f3fa3e82f3da.exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
5a51cd846336f4900789df0f28e15b90c6eb9228c08105dd842ab58fd0e33af8.exe
Resource
win7v20210410
Behavioral task
behavioral10
Sample
5a51cd846336f4900789df0f28e15b90c6eb9228c08105dd842ab58fd0e33af8.exe
Resource
win10v20210408
Behavioral task
behavioral11
Sample
684f7a95584e49ee72624e94d79137b53e329d8ccc8909357d83b1a45fd0beab.exe
Resource
win7v20210410
Behavioral task
behavioral12
Sample
684f7a95584e49ee72624e94d79137b53e329d8ccc8909357d83b1a45fd0beab.exe
Resource
win10v20210408
Behavioral task
behavioral13
Sample
6a784913e59abb1b02af92535709bc244fac4c3f2252200403c89dfc350197a2.exe
Resource
win7v20210408
Behavioral task
behavioral14
Sample
6a784913e59abb1b02af92535709bc244fac4c3f2252200403c89dfc350197a2.exe
Resource
win10v20210408
Behavioral task
behavioral15
Sample
97a7a92b88033bbd98d67b8438362854391035ae7c464f8d50a2e1fe7304f7f7.exe
Resource
win7v20210408
Behavioral task
behavioral16
Sample
97a7a92b88033bbd98d67b8438362854391035ae7c464f8d50a2e1fe7304f7f7.exe
Resource
win10v20210408
Behavioral task
behavioral17
Sample
aeddc10ec9201b276bda81b6e047dbddc8bb4933c2ed796b6f377c8e2c52d012.exe
Resource
win7v20210410
Behavioral task
behavioral18
Sample
aeddc10ec9201b276bda81b6e047dbddc8bb4933c2ed796b6f377c8e2c52d012.exe
Resource
win10v20210410
Behavioral task
behavioral19
Sample
d1c5f5fb1ad2b7467b4714546bfbf7cbc5365ae682cfb9bfeb2821432f91bef8.exe
Resource
win7v20210408
Behavioral task
behavioral20
Sample
d1c5f5fb1ad2b7467b4714546bfbf7cbc5365ae682cfb9bfeb2821432f91bef8.exe
Resource
win10v20210408
General
-
Target
1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe
-
Size
636KB
-
MD5
4a4958ffe77c82041421024861cf0cc9
-
SHA1
c4c371f190c7363c8d0e6675702338f11214ea09
-
SHA256
1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53
-
SHA512
ac05159733601ffecfab34cba6a5465ca553e035046c50361784409d2b779bcb40c2f05bf0fa749fd2470cae20675cd04d9c46dc6977e46b7d27fff3ae2226e5
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
Processes:
1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe:*:enabled:@shell32.dll,-1" 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 3916 created 3892 3916 WerFault.exe 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3916 3892 WerFault.exe 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exeWerFault.exepid process 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe 3916 WerFault.exe -
Suspicious behavior: MapViewOfSection 59 IoCs
Processes:
1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exepid process 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exeWerFault.exedescription pid process Token: SeDebugPrivilege 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe Token: SeRestorePrivilege 3916 WerFault.exe Token: SeBackupPrivilege 3916 WerFault.exe Token: SeDebugPrivilege 3916 WerFault.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exepid process 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exedescription pid process target process PID 3892 wrote to memory of 568 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe winlogon.exe PID 3892 wrote to memory of 568 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe winlogon.exe PID 3892 wrote to memory of 568 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe winlogon.exe PID 3892 wrote to memory of 568 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe winlogon.exe PID 3892 wrote to memory of 568 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe winlogon.exe PID 3892 wrote to memory of 568 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe winlogon.exe PID 3892 wrote to memory of 620 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe lsass.exe PID 3892 wrote to memory of 620 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe lsass.exe PID 3892 wrote to memory of 620 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe lsass.exe PID 3892 wrote to memory of 620 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe lsass.exe PID 3892 wrote to memory of 620 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe lsass.exe PID 3892 wrote to memory of 620 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe lsass.exe PID 3892 wrote to memory of 708 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 708 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 708 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 708 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 708 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 708 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 728 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe fontdrvhost.exe PID 3892 wrote to memory of 728 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe fontdrvhost.exe PID 3892 wrote to memory of 728 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe fontdrvhost.exe PID 3892 wrote to memory of 728 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe fontdrvhost.exe PID 3892 wrote to memory of 728 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe fontdrvhost.exe PID 3892 wrote to memory of 728 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe fontdrvhost.exe PID 3892 wrote to memory of 736 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe fontdrvhost.exe PID 3892 wrote to memory of 736 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe fontdrvhost.exe PID 3892 wrote to memory of 736 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe fontdrvhost.exe PID 3892 wrote to memory of 736 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe fontdrvhost.exe PID 3892 wrote to memory of 736 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe fontdrvhost.exe PID 3892 wrote to memory of 736 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe fontdrvhost.exe PID 3892 wrote to memory of 768 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 768 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 768 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 768 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 768 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 768 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 840 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 840 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 840 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 840 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 840 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 840 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 888 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 888 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 888 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 888 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 888 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 888 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 972 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe dwm.exe PID 3892 wrote to memory of 972 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe dwm.exe PID 3892 wrote to memory of 972 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe dwm.exe PID 3892 wrote to memory of 972 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe dwm.exe PID 3892 wrote to memory of 972 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe dwm.exe PID 3892 wrote to memory of 972 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe dwm.exe PID 3892 wrote to memory of 996 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 996 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 996 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 996 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 996 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 996 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 392 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 392 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 392 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe PID 3892 wrote to memory of 392 3892 1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe svchost.exe
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s PlugPlay1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k rpcss1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NcbService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s EventSystem1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵
-
c:\windows\system32\sihost.exesihost.exe2⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s Dhcp1⤵
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s CDPSvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe"C:\Users\Admin\AppData\Local\Temp\1c222584eda989738779e1b914ec20bf428ad0db3683ca71f43f8a80c4494d53.exe"2⤵
- Modifies firewall policy service
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 12203⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R2⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s TrkWks1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s CryptSvc1⤵
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservicenetworkrestricted -s PolicyAgent1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3b81⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s tiledatamodelsvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s WinHttpAutoProxySvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s LanmanWorkstation1⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s StateRepository1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s netprofm1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s Dnscache1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s NlaSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s AudioEndpointBuilder1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s FontCache1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s nsi1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s EventLog1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s lmhosts1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s LSM1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵