Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
15-05-2021 12:32
Static task
static1
Behavioral task
behavioral1
Sample
09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe
Resource
win7v20210410
General
-
Target
09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe
-
Size
390KB
-
MD5
4ac3edd36979050ed63490ca4d64d558
-
SHA1
965d34311d79c178187c215fbc22ffae3d89f2fd
-
SHA256
09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5
-
SHA512
e4fa7ffd6433784ecf5e0e484faa2f2bdc86ff538b39028c619949f9450873c35fe3fa8915755b4cef29ee41206ef3f60aa64da0427a60ce54fc4ee32406f1fb
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
Processes:
09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe:*:enabled:@shell32.dll,-1" 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe -
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process target process PID 3060 created 3940 3060 WerFault.exe DesktopLayer.exe PID 3500 created 3744 3500 WerFault.exe 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe -
Executes dropped EXE 2 IoCs
Processes:
09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5Srv.exeDesktopLayer.exepid process 1228 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5Srv.exe 3940 DesktopLayer.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5Srv.exe upx C:\Users\Admin\AppData\Local\Temp\09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5Srv.exe upx C:\PROGRAM FILES (X86)\MICROSOFT\DESKTOPLAYER.EXE upx C:\Program Files (x86)\Microsoft\DesktopLayer.exe upx behavioral2/memory/1228-121-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5Srv.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\px1274.tmp 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5Srv.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3500 3744 WerFault.exe 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3060 3940 WerFault.exe DesktopLayer.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
Processes:
09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exeDesktopLayer.exeWerFault.exeWerFault.exepid process 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3940 DesktopLayer.exe 3940 DesktopLayer.exe 3940 DesktopLayer.exe 3940 DesktopLayer.exe 3060 WerFault.exe 3060 WerFault.exe 3060 WerFault.exe 3060 WerFault.exe 3060 WerFault.exe 3060 WerFault.exe 3060 WerFault.exe 3060 WerFault.exe 3500 WerFault.exe 3060 WerFault.exe 3500 WerFault.exe 3060 WerFault.exe 3500 WerFault.exe 3500 WerFault.exe 3060 WerFault.exe 3500 WerFault.exe 3060 WerFault.exe 3500 WerFault.exe 3060 WerFault.exe 3500 WerFault.exe 3500 WerFault.exe 3060 WerFault.exe 3500 WerFault.exe 3500 WerFault.exe 3500 WerFault.exe 3500 WerFault.exe 3500 WerFault.exe 3500 WerFault.exe -
Suspicious behavior: MapViewOfSection 63 IoCs
Processes:
09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exepid process 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exeWerFault.exeWerFault.exedescription pid process Token: SeDebugPrivilege 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe Token: SeRestorePrivilege 3060 WerFault.exe Token: SeBackupPrivilege 3060 WerFault.exe Token: SeRestorePrivilege 3500 WerFault.exe Token: SeBackupPrivilege 3500 WerFault.exe Token: SeDebugPrivilege 3060 WerFault.exe Token: SeDebugPrivilege 3500 WerFault.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5Srv.exedescription pid process target process PID 3744 wrote to memory of 1228 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5Srv.exe PID 3744 wrote to memory of 1228 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5Srv.exe PID 3744 wrote to memory of 1228 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5Srv.exe PID 3744 wrote to memory of 572 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe winlogon.exe PID 3744 wrote to memory of 572 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe winlogon.exe PID 3744 wrote to memory of 572 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe winlogon.exe PID 3744 wrote to memory of 572 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe winlogon.exe PID 3744 wrote to memory of 572 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe winlogon.exe PID 3744 wrote to memory of 572 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe winlogon.exe PID 3744 wrote to memory of 632 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe lsass.exe PID 3744 wrote to memory of 632 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe lsass.exe PID 3744 wrote to memory of 632 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe lsass.exe PID 3744 wrote to memory of 632 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe lsass.exe PID 3744 wrote to memory of 632 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe lsass.exe PID 3744 wrote to memory of 632 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe lsass.exe PID 3744 wrote to memory of 716 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 716 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 716 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 716 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 716 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 716 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 732 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe fontdrvhost.exe PID 3744 wrote to memory of 732 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe fontdrvhost.exe PID 3744 wrote to memory of 732 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe fontdrvhost.exe PID 3744 wrote to memory of 732 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe fontdrvhost.exe PID 3744 wrote to memory of 732 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe fontdrvhost.exe PID 3744 wrote to memory of 732 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe fontdrvhost.exe PID 3744 wrote to memory of 736 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe fontdrvhost.exe PID 3744 wrote to memory of 736 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe fontdrvhost.exe PID 1228 wrote to memory of 3940 1228 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5Srv.exe DesktopLayer.exe PID 3744 wrote to memory of 736 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe fontdrvhost.exe PID 1228 wrote to memory of 3940 1228 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5Srv.exe DesktopLayer.exe PID 3744 wrote to memory of 736 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe fontdrvhost.exe PID 1228 wrote to memory of 3940 1228 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5Srv.exe DesktopLayer.exe PID 3744 wrote to memory of 736 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe fontdrvhost.exe PID 3744 wrote to memory of 736 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe fontdrvhost.exe PID 3744 wrote to memory of 796 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 796 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 796 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 796 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 796 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 796 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 856 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 856 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 856 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 856 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 856 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 856 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 896 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 896 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 896 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 896 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 896 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 896 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 980 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe dwm.exe PID 3744 wrote to memory of 980 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe dwm.exe PID 3744 wrote to memory of 980 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe dwm.exe PID 3744 wrote to memory of 980 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe dwm.exe PID 3744 wrote to memory of 980 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe dwm.exe PID 3744 wrote to memory of 980 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe dwm.exe PID 3744 wrote to memory of 1000 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 1000 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 1000 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe PID 3744 wrote to memory of 1000 3744 09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe svchost.exe
Processes
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3901⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservicenetworkrestricted -s PolicyAgent1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
-
c:\windows\system32\sihost.exesihost.exe1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s CryptSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R2⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe"C:\Users\Admin\AppData\Local\Temp\09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5.exe"2⤵
- Modifies firewall policy service
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5Srv.exeC:\Users\Admin\AppData\Local\Temp\09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5Srv.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3940 -s 4405⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 6083⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s CDPSvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s TrkWks1⤵
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s tiledatamodelsvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s LanmanWorkstation1⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s StateRepository1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s netprofm1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s Dnscache1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s NlaSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s FontCache1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s AudioEndpointBuilder1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s Dhcp1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s EventSystem1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s nsi1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s EventLog1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NcbService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s lmhosts1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s LSM1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k rpcss1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding2⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s PlugPlay1⤵
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\PROGRAM FILES (X86)\MICROSOFT\DESKTOPLAYER.EXEMD5
e7efb2a2b36ab241b6c9b770abf95000
SHA1d4c253cbf80dc65a04747aea4afc91de6a4a4c5d
SHA2564c7bf8d4e1ad5bd27b4b990791d4968be2a1d9cbb092c1af2e19a42c1b93e4c8
SHA512958e64677c0acc6b2c0ef8e5ff5c39ea12986b8d5d0820710572af7669fdb6fe740e3ee609c1d9dfcdbfaee6a6f8fdeda25f64f7ad4d335627a024d6a1b4fcf3
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exeMD5
e7efb2a2b36ab241b6c9b770abf95000
SHA1d4c253cbf80dc65a04747aea4afc91de6a4a4c5d
SHA2564c7bf8d4e1ad5bd27b4b990791d4968be2a1d9cbb092c1af2e19a42c1b93e4c8
SHA512958e64677c0acc6b2c0ef8e5ff5c39ea12986b8d5d0820710572af7669fdb6fe740e3ee609c1d9dfcdbfaee6a6f8fdeda25f64f7ad4d335627a024d6a1b4fcf3
-
C:\Users\Admin\AppData\Local\Temp\09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5Srv.exeMD5
e7efb2a2b36ab241b6c9b770abf95000
SHA1d4c253cbf80dc65a04747aea4afc91de6a4a4c5d
SHA2564c7bf8d4e1ad5bd27b4b990791d4968be2a1d9cbb092c1af2e19a42c1b93e4c8
SHA512958e64677c0acc6b2c0ef8e5ff5c39ea12986b8d5d0820710572af7669fdb6fe740e3ee609c1d9dfcdbfaee6a6f8fdeda25f64f7ad4d335627a024d6a1b4fcf3
-
C:\Users\Admin\AppData\Local\Temp\09ff356818f8b41d3c538a7648bb2ea5971cd54c8a2959d3c04a42867555fbe5Srv.exeMD5
e7efb2a2b36ab241b6c9b770abf95000
SHA1d4c253cbf80dc65a04747aea4afc91de6a4a4c5d
SHA2564c7bf8d4e1ad5bd27b4b990791d4968be2a1d9cbb092c1af2e19a42c1b93e4c8
SHA512958e64677c0acc6b2c0ef8e5ff5c39ea12986b8d5d0820710572af7669fdb6fe740e3ee609c1d9dfcdbfaee6a6f8fdeda25f64f7ad4d335627a024d6a1b4fcf3
-
memory/1228-114-0x0000000000000000-mapping.dmp
-
memory/1228-120-0x00000000001E0000-0x00000000001EF000-memory.dmpFilesize
60KB
-
memory/1228-121-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1228-122-0x000000007FEA0000-0x000000007FEAC000-memory.dmpFilesize
48KB
-
memory/3940-117-0x0000000000000000-mapping.dmp