Analysis
-
max time kernel
144s -
max time network
157s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
15-05-2021 15:43
Static task
static1
Behavioral task
behavioral1
Sample
c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe
Resource
win7v20210410
General
-
Target
c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe
-
Size
256KB
-
MD5
f9357a88b1a7f26e732e7a8f6cfca22c
-
SHA1
f07f1628ce975f99b86384326173755253855655
-
SHA256
c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a
-
SHA512
2e2ffd27e058e57453a31a9a0bee5a63e5413efbf6a0307fba6338fa778b0ed786e68b2c8de1190ebb266cd4cce8d0afd4dcb86c184b181ec5ac4ee1c52fa0ad
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
Processes:
c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe:*:enabled:@shell32.dll,-1" c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 212 created 1848 212 WerFault.exe DesktopLayer.exe -
Executes dropped EXE 2 IoCs
Processes:
c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82aSrv.exeDesktopLayer.exepid process 3544 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82aSrv.exe 1848 DesktopLayer.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82aSrv.exe upx C:\Users\Admin\AppData\Local\Temp\c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82aSrv.exe upx C:\Program Files (x86)\Microsoft\DesktopLayer.exe upx C:\PROGRAM FILES (X86)\MICROSOFT\DESKTOPLAYER.EXE upx behavioral2/memory/3544-124-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82aSrv.exedescription ioc process File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82aSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82aSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\px640F.tmp c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82aSrv.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 212 1848 WerFault.exe DesktopLayer.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exeDesktopLayer.exeWerFault.exepid process 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 1848 DesktopLayer.exe 1848 DesktopLayer.exe 1848 DesktopLayer.exe 1848 DesktopLayer.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
Processes:
c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exepid process 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exeWerFault.exedescription pid process Token: SeDebugPrivilege 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe Token: SeRestorePrivilege 212 WerFault.exe Token: SeBackupPrivilege 212 WerFault.exe Token: SeDebugPrivilege 212 WerFault.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exec5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82aSrv.exedescription pid process target process PID 744 wrote to memory of 3544 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82aSrv.exe PID 744 wrote to memory of 3544 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82aSrv.exe PID 744 wrote to memory of 3544 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82aSrv.exe PID 744 wrote to memory of 564 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe winlogon.exe PID 744 wrote to memory of 564 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe winlogon.exe PID 744 wrote to memory of 564 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe winlogon.exe PID 744 wrote to memory of 564 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe winlogon.exe PID 744 wrote to memory of 564 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe winlogon.exe PID 744 wrote to memory of 564 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe winlogon.exe PID 3544 wrote to memory of 1848 3544 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82aSrv.exe DesktopLayer.exe PID 3544 wrote to memory of 1848 3544 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82aSrv.exe DesktopLayer.exe PID 3544 wrote to memory of 1848 3544 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82aSrv.exe DesktopLayer.exe PID 744 wrote to memory of 644 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe lsass.exe PID 744 wrote to memory of 644 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe lsass.exe PID 744 wrote to memory of 644 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe lsass.exe PID 744 wrote to memory of 644 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe lsass.exe PID 744 wrote to memory of 644 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe lsass.exe PID 744 wrote to memory of 644 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe lsass.exe PID 744 wrote to memory of 732 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 732 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 732 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 732 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 732 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 732 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 752 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe fontdrvhost.exe PID 744 wrote to memory of 752 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe fontdrvhost.exe PID 744 wrote to memory of 752 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe fontdrvhost.exe PID 744 wrote to memory of 752 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe fontdrvhost.exe PID 744 wrote to memory of 752 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe fontdrvhost.exe PID 744 wrote to memory of 752 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe fontdrvhost.exe PID 744 wrote to memory of 756 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe fontdrvhost.exe PID 744 wrote to memory of 756 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe fontdrvhost.exe PID 744 wrote to memory of 756 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe fontdrvhost.exe PID 744 wrote to memory of 756 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe fontdrvhost.exe PID 744 wrote to memory of 756 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe fontdrvhost.exe PID 744 wrote to memory of 756 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe fontdrvhost.exe PID 744 wrote to memory of 768 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 768 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 768 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 768 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 768 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 768 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 864 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 864 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 864 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 864 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 864 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 864 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 912 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 912 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 912 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 912 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 912 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 912 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 1000 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe dwm.exe PID 744 wrote to memory of 1000 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe dwm.exe PID 744 wrote to memory of 1000 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe dwm.exe PID 744 wrote to memory of 1000 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe dwm.exe PID 744 wrote to memory of 1000 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe dwm.exe PID 744 wrote to memory of 1000 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe dwm.exe PID 744 wrote to memory of 60 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 60 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 60 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe PID 744 wrote to memory of 60 744 c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe svchost.exe
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s PlugPlay1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s AudioEndpointBuilder1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s tiledatamodelsvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s TrkWks1⤵
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s CDPSvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe"C:\Users\Admin\AppData\Local\Temp\c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82a.exe"2⤵
- Modifies firewall policy service
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82aSrv.exeC:\Users\Admin\AppData\Local\Temp\c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82aSrv.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1848 -s 4605⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R2⤵
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s CryptSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservicenetworkrestricted -s PolicyAgent1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵
-
c:\windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3c01⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s LanmanWorkstation1⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s StateRepository1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s netprofm1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s Dnscache1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s FontCache1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s NlaSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s Dhcp1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s nsi1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s EventSystem1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s EventLog1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NcbService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s lmhosts1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s LSM1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k rpcss1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding2⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\PROGRAM FILES (X86)\MICROSOFT\DESKTOPLAYER.EXEMD5
e7efb2a2b36ab241b6c9b770abf95000
SHA1d4c253cbf80dc65a04747aea4afc91de6a4a4c5d
SHA2564c7bf8d4e1ad5bd27b4b990791d4968be2a1d9cbb092c1af2e19a42c1b93e4c8
SHA512958e64677c0acc6b2c0ef8e5ff5c39ea12986b8d5d0820710572af7669fdb6fe740e3ee609c1d9dfcdbfaee6a6f8fdeda25f64f7ad4d335627a024d6a1b4fcf3
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exeMD5
e7efb2a2b36ab241b6c9b770abf95000
SHA1d4c253cbf80dc65a04747aea4afc91de6a4a4c5d
SHA2564c7bf8d4e1ad5bd27b4b990791d4968be2a1d9cbb092c1af2e19a42c1b93e4c8
SHA512958e64677c0acc6b2c0ef8e5ff5c39ea12986b8d5d0820710572af7669fdb6fe740e3ee609c1d9dfcdbfaee6a6f8fdeda25f64f7ad4d335627a024d6a1b4fcf3
-
C:\Users\Admin\AppData\Local\Temp\c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82aSrv.exeMD5
e7efb2a2b36ab241b6c9b770abf95000
SHA1d4c253cbf80dc65a04747aea4afc91de6a4a4c5d
SHA2564c7bf8d4e1ad5bd27b4b990791d4968be2a1d9cbb092c1af2e19a42c1b93e4c8
SHA512958e64677c0acc6b2c0ef8e5ff5c39ea12986b8d5d0820710572af7669fdb6fe740e3ee609c1d9dfcdbfaee6a6f8fdeda25f64f7ad4d335627a024d6a1b4fcf3
-
C:\Users\Admin\AppData\Local\Temp\c5d6fa42e88c4545b51854e439f7de1cbaf8877e69522d5438a11bc087fbf82aSrv.exeMD5
e7efb2a2b36ab241b6c9b770abf95000
SHA1d4c253cbf80dc65a04747aea4afc91de6a4a4c5d
SHA2564c7bf8d4e1ad5bd27b4b990791d4968be2a1d9cbb092c1af2e19a42c1b93e4c8
SHA512958e64677c0acc6b2c0ef8e5ff5c39ea12986b8d5d0820710572af7669fdb6fe740e3ee609c1d9dfcdbfaee6a6f8fdeda25f64f7ad4d335627a024d6a1b4fcf3
-
memory/744-126-0x00000000004A0000-0x00000000004A1000-memory.dmpFilesize
4KB
-
memory/1848-117-0x0000000000000000-mapping.dmp
-
memory/1848-120-0x000000007FEA0000-0x000000007FEAC000-memory.dmpFilesize
48KB
-
memory/3544-114-0x0000000000000000-mapping.dmp
-
memory/3544-119-0x00000000001E0000-0x00000000001EF000-memory.dmpFilesize
60KB
-
memory/3544-123-0x000000007FEA0000-0x000000007FEAC000-memory.dmpFilesize
48KB
-
memory/3544-124-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB