Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
13-05-2021 13:33
Static task
static1
Behavioral task
behavioral1
Sample
2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe
Resource
win7v20210408
General
-
Target
2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe
-
Size
320KB
-
MD5
554064d9754f879cc5c37d6970755c96
-
SHA1
2518e4b0e162cf77de755c59a0329c1b74072de0
-
SHA256
2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885
-
SHA512
d3e60cb6706f4081b8baf902c24c884490ab9558a0a0206b7f89554a25e953b9327b80a73e3c2e8997a5db2a7f23657e9b50d3679db52723f91ea6c309954aaf
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
Processes:
2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe:*:enabled:@shell32.dll,-1" 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe -
Executes dropped EXE 2 IoCs
Processes:
2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885Srv.exeDesktopLayer.exepid process 864 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885Srv.exe 1028 DesktopLayer.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885Srv.exe upx C:\Users\Admin\AppData\Local\Temp\2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885Srv.exe upx C:\Program Files (x86)\Microsoft\DesktopLayer.exe upx C:\Program Files (x86)\Microsoft\DesktopLayer.exe upx behavioral2/memory/864-123-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885Srv.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\px21D6.tmp 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885Srv.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "304897416" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30886037" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "304897416" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "327743255" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "309741908" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30886037" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "327791841" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "327759849" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30886037" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3CF09781-B488-11EB-A11C-CE9B817779E4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exeDesktopLayer.exepid process 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 1028 DesktopLayer.exe 1028 DesktopLayer.exe 1028 DesktopLayer.exe 1028 DesktopLayer.exe 1028 DesktopLayer.exe 1028 DesktopLayer.exe 1028 DesktopLayer.exe 1028 DesktopLayer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 1236 iexplore.exe -
Suspicious behavior: MapViewOfSection 60 IoCs
Processes:
2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exepid process 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exedescription pid process Token: SeDebugPrivilege 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1236 iexplore.exe 1236 iexplore.exe 3536 IEXPLORE.EXE 3536 IEXPLORE.EXE 3536 IEXPLORE.EXE 3536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885Srv.exeDesktopLayer.exedescription pid process target process PID 3724 wrote to memory of 864 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885Srv.exe PID 3724 wrote to memory of 864 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885Srv.exe PID 3724 wrote to memory of 864 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885Srv.exe PID 3724 wrote to memory of 552 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe winlogon.exe PID 3724 wrote to memory of 552 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe winlogon.exe PID 3724 wrote to memory of 552 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe winlogon.exe PID 3724 wrote to memory of 552 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe winlogon.exe PID 3724 wrote to memory of 552 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe winlogon.exe PID 3724 wrote to memory of 552 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe winlogon.exe PID 3724 wrote to memory of 632 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe lsass.exe PID 3724 wrote to memory of 632 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe lsass.exe PID 3724 wrote to memory of 632 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe lsass.exe PID 3724 wrote to memory of 632 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe lsass.exe PID 3724 wrote to memory of 632 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe lsass.exe PID 3724 wrote to memory of 632 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe lsass.exe PID 3724 wrote to memory of 716 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe fontdrvhost.exe PID 3724 wrote to memory of 716 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe fontdrvhost.exe PID 3724 wrote to memory of 716 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe fontdrvhost.exe PID 3724 wrote to memory of 716 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe fontdrvhost.exe PID 3724 wrote to memory of 716 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe fontdrvhost.exe PID 3724 wrote to memory of 716 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe fontdrvhost.exe PID 3724 wrote to memory of 720 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe fontdrvhost.exe PID 3724 wrote to memory of 720 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe fontdrvhost.exe PID 3724 wrote to memory of 720 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe fontdrvhost.exe PID 3724 wrote to memory of 720 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe fontdrvhost.exe PID 3724 wrote to memory of 720 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe fontdrvhost.exe PID 3724 wrote to memory of 720 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe fontdrvhost.exe PID 3724 wrote to memory of 736 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 3724 wrote to memory of 736 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 864 wrote to memory of 1028 864 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885Srv.exe DesktopLayer.exe PID 864 wrote to memory of 1028 864 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885Srv.exe DesktopLayer.exe PID 864 wrote to memory of 1028 864 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885Srv.exe DesktopLayer.exe PID 3724 wrote to memory of 736 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 3724 wrote to memory of 736 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 3724 wrote to memory of 736 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 3724 wrote to memory of 736 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 1028 wrote to memory of 1236 1028 DesktopLayer.exe iexplore.exe PID 1028 wrote to memory of 1236 1028 DesktopLayer.exe iexplore.exe PID 3724 wrote to memory of 804 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 3724 wrote to memory of 804 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 3724 wrote to memory of 804 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 3724 wrote to memory of 804 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 3724 wrote to memory of 804 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 3724 wrote to memory of 804 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 3724 wrote to memory of 856 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 3724 wrote to memory of 856 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 3724 wrote to memory of 856 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 3724 wrote to memory of 856 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 3724 wrote to memory of 856 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 3724 wrote to memory of 856 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 3724 wrote to memory of 896 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 3724 wrote to memory of 896 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 3724 wrote to memory of 896 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 3724 wrote to memory of 896 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 3724 wrote to memory of 896 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 3724 wrote to memory of 896 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 3724 wrote to memory of 984 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe dwm.exe PID 3724 wrote to memory of 984 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe dwm.exe PID 3724 wrote to memory of 984 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe dwm.exe PID 3724 wrote to memory of 984 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe dwm.exe PID 3724 wrote to memory of 984 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe dwm.exe PID 3724 wrote to memory of 984 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe dwm.exe PID 3724 wrote to memory of 348 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe PID 3724 wrote to memory of 348 3724 2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe svchost.exe
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵
-
c:\windows\system32\sihost.exesihost.exe2⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s Dnscache1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s WinHttpAutoProxySvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s tiledatamodelsvc1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3c41⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservicenetworkrestricted -s PolicyAgent1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s TrkWks1⤵
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s CDPSvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe"C:\Users\Admin\AppData\Local\Temp\2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885.exe"2⤵
- Modifies firewall policy service
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885Srv.exeC:\Users\Admin\AppData\Local\Temp\2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885Srv.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1236 CREDAT:82945 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R2⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s CryptSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s LanmanWorkstation1⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s StateRepository1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s netprofm1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s NlaSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s FontCache1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s AudioEndpointBuilder1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s Dhcp1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s nsi1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s EventSystem1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s EventLog1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NcbService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s lmhosts1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s LSM1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k rpcss1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding2⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s PlugPlay1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exeMD5
e7efb2a2b36ab241b6c9b770abf95000
SHA1d4c253cbf80dc65a04747aea4afc91de6a4a4c5d
SHA2564c7bf8d4e1ad5bd27b4b990791d4968be2a1d9cbb092c1af2e19a42c1b93e4c8
SHA512958e64677c0acc6b2c0ef8e5ff5c39ea12986b8d5d0820710572af7669fdb6fe740e3ee609c1d9dfcdbfaee6a6f8fdeda25f64f7ad4d335627a024d6a1b4fcf3
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exeMD5
e7efb2a2b36ab241b6c9b770abf95000
SHA1d4c253cbf80dc65a04747aea4afc91de6a4a4c5d
SHA2564c7bf8d4e1ad5bd27b4b990791d4968be2a1d9cbb092c1af2e19a42c1b93e4c8
SHA512958e64677c0acc6b2c0ef8e5ff5c39ea12986b8d5d0820710572af7669fdb6fe740e3ee609c1d9dfcdbfaee6a6f8fdeda25f64f7ad4d335627a024d6a1b4fcf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
ef07b2dc81b7fdcc01d8a9cce1261822
SHA1535c60f61ed56d43a349e92b86dd5204a1b61859
SHA2564f4d35e9bbae40c756cb82b60a2bbfe0dfe055b06ddf2494a953ce7565ff8eb6
SHA5121a26ee805d55b252567caec75c0b75ec5493aa1865b4fd8a1cf6b18972e2ffd82ba778b4a6a80ed85c9d016d841d26be11d4bc6f4bf8d8b512e7261dc7ad3fe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
2afd8f2820b91b98ed2a5015c5fafe10
SHA1dd9202793bee41fecb7b5bce9d3f6ab619267170
SHA256f059baf75fbec900fa036f09d129cb694f6fc9689c3d90df63bec1cc7a32ddf1
SHA512848c5764b99658a66a295fd8cdc77a35becc9de39e926a0799b59243da96b1a47f2ac920356f29cefb51b7acaf6f26ce4c052de1a9d3c50ad8ec6290ba946b1f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\409VGYVK.cookieMD5
6ede68b286ac2af55d7986f2723bd39a
SHA1d1b14ac6fc72fa63a35fa39a2ce641e4e1d134bc
SHA256542f03b208429dc1d370791e7e960f70fdfbb032b66af23a18c48909ee9bdd5a
SHA5123f9189a51477613427137003d2083f912fd7deaf18db7d1a41d94111ee75754d32beaab65d8cd7ecafff1239c65017a1a9dda2b016e07c556cb94813dbe03704
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\4OO149L2.cookieMD5
7d69b498ef41632e0a80fb96b05f63c7
SHA1c8ad80078f4bf9c57ad128f2e9cea2fc8f6cdc10
SHA25619be813f68d29731b32f5ca70088aeceb32d5dee8ec21db52bd7da89c89d3dd9
SHA51256abba3fbdb1117b870f787ed27515e6628e0eeeb96dc7d56db711ac5821df184db2de6dea0f305ee9c139a00736c12818722bea5f79cccb71114076a6e4d9d3
-
C:\Users\Admin\AppData\Local\Temp\2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885Srv.exeMD5
e7efb2a2b36ab241b6c9b770abf95000
SHA1d4c253cbf80dc65a04747aea4afc91de6a4a4c5d
SHA2564c7bf8d4e1ad5bd27b4b990791d4968be2a1d9cbb092c1af2e19a42c1b93e4c8
SHA512958e64677c0acc6b2c0ef8e5ff5c39ea12986b8d5d0820710572af7669fdb6fe740e3ee609c1d9dfcdbfaee6a6f8fdeda25f64f7ad4d335627a024d6a1b4fcf3
-
C:\Users\Admin\AppData\Local\Temp\2075f8e945d13b6e8d6526fccd717ac7db550f142cc1ba3865489a99f8e76885Srv.exeMD5
e7efb2a2b36ab241b6c9b770abf95000
SHA1d4c253cbf80dc65a04747aea4afc91de6a4a4c5d
SHA2564c7bf8d4e1ad5bd27b4b990791d4968be2a1d9cbb092c1af2e19a42c1b93e4c8
SHA512958e64677c0acc6b2c0ef8e5ff5c39ea12986b8d5d0820710572af7669fdb6fe740e3ee609c1d9dfcdbfaee6a6f8fdeda25f64f7ad4d335627a024d6a1b4fcf3
-
memory/864-123-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/864-122-0x00000000001E0000-0x00000000001EF000-memory.dmpFilesize
60KB
-
memory/864-114-0x0000000000000000-mapping.dmp
-
memory/1028-120-0x00000000004B0000-0x00000000004B1000-memory.dmpFilesize
4KB
-
memory/1028-117-0x0000000000000000-mapping.dmp
-
memory/1236-126-0x00007FFA58570000-0x00007FFA585DB000-memory.dmpFilesize
428KB
-
memory/1236-121-0x0000000000000000-mapping.dmp
-
memory/3536-128-0x0000000000000000-mapping.dmp
-
memory/3724-127-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB