Analysis
-
max time kernel
152s -
max time network
126s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
29-08-2021 04:44
Static task
static1
Behavioral task
behavioral1
Sample
7acf67be5628cf690be7ce66283cb76aad3f8ffbd78035a9c8c7c8f064499b57.exe
Resource
win10v20210408
General
-
Target
7acf67be5628cf690be7ce66283cb76aad3f8ffbd78035a9c8c7c8f064499b57.exe
-
Size
143KB
-
MD5
42b119465fffd697e19f3e04ba19443b
-
SHA1
9fb08746fa660d7abeacd13d7c72e6d4987bf856
-
SHA256
7acf67be5628cf690be7ce66283cb76aad3f8ffbd78035a9c8c7c8f064499b57
-
SHA512
e855ddc89225227f4fbee647a11082537eee14d26950d9db8a554efa6d0a1b728e21aa9bc2591008c3a1efab862a8025a825eb26f1589dc00749453016c5a6aa
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Extracted
redline
nn
135.181.49.56:47634
Extracted
raccoon
d02c5d65069fc7ce1993e7c52edf0c9c4c195c81
-
url4cnc
https://telete.in/open3entershift
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
resource yara_rule behavioral1/memory/1072-204-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/1072-205-0x000000000041C5C6-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 1532 created 3468 1532 WerFault.exe 85 -
Turns off Windows Defender SpyNet reporting 2 TTPs
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Nirsoft 3 IoCs
resource yara_rule behavioral1/files/0x00030000000155ab-167.dat Nirsoft behavioral1/files/0x00030000000155ab-169.dat Nirsoft behavioral1/files/0x00030000000155ab-173.dat Nirsoft -
Downloads MZ/PE file
-
Executes dropped EXE 11 IoCs
pid Process 528 F7F2.exe 2116 FF46.exe 3860 ED.exe 3968 39E.exe 3468 5C1.exe 2972 AdvancedRun.exe 3344 AdvancedRun.exe 1244 csrss.exe 4988 csrss.exe 1144 catusvw 4424 catusvw -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion F7F2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion F7F2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FF46.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FF46.exe -
Deletes itself 1 IoCs
pid Process 2740 Process not Found -
Loads dropped DLL 5 IoCs
pid Process 3468 5C1.exe 3468 5C1.exe 3468 5C1.exe 3468 5C1.exe 3468 5C1.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000500000001ab30-119.dat themida behavioral1/files/0x000500000001ab30-120.dat themida behavioral1/files/0x000200000001ab32-123.dat themida behavioral1/files/0x000200000001ab32-125.dat themida behavioral1/memory/528-126-0x00000000001E0000-0x00000000001E1000-memory.dmp themida behavioral1/memory/2116-140-0x0000000000B00000-0x0000000000B01000-memory.dmp themida -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection ED.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ED.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" ED.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ED.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths ED.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions ED.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\ED.exe = "0" ED.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet ED.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" ED.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features ED.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\csrss.exe\" -start" 39E.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run 39E.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FF46.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ED.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ED.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA F7F2.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: csrss.exe File opened (read-only) \??\I: csrss.exe File opened (read-only) \??\A: csrss.exe File opened (read-only) \??\F: csrss.exe File opened (read-only) \??\Z: csrss.exe File opened (read-only) \??\U: csrss.exe File opened (read-only) \??\O: csrss.exe File opened (read-only) \??\N: csrss.exe File opened (read-only) \??\L: csrss.exe File opened (read-only) \??\H: csrss.exe File opened (read-only) \??\G: csrss.exe File opened (read-only) \??\E: csrss.exe File opened (read-only) \??\X: csrss.exe File opened (read-only) \??\V: csrss.exe File opened (read-only) \??\S: csrss.exe File opened (read-only) \??\R: csrss.exe File opened (read-only) \??\Q: csrss.exe File opened (read-only) \??\P: csrss.exe File opened (read-only) \??\K: csrss.exe File opened (read-only) \??\Y: csrss.exe File opened (read-only) \??\T: csrss.exe File opened (read-only) \??\M: csrss.exe File opened (read-only) \??\J: csrss.exe File opened (read-only) \??\B: csrss.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 24 geoiptool.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 528 F7F2.exe 2116 FF46.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 856 set thread context of 2980 856 7acf67be5628cf690be7ce66283cb76aad3f8ffbd78035a9c8c7c8f064499b57.exe 77 PID 3860 set thread context of 1072 3860 ED.exe 101 PID 1144 set thread context of 4424 1144 catusvw 152 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\sunec.jar csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.jsp.jasper_1.0.400.v20130327-1442.jar csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-coredump.jar csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteVL_MAK-ppd.xrm-ms csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_Trial-ppd.xrm-ms.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPointR_OEM_Perp-ul-oob.xrm-ms.payfast290.B2D-6D4-349 csrss.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-autoupdate-services.xml csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\cmm\GRAY.pf csrss.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler.xml csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RInt.16.msi csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial1-ppd.xrm-ms csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.contrast-white_scale-180.png csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\th\msipc.dll.mui.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\cardview-flag.png.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\feature.xml csrss.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\lib\deployed\jdk16\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalPipcR_OEM_Perp-pl.xrm-ms.payfast290.B2D-6D4-349 csrss.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\he\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CONCRETE\THMBNAIL.PNG.payfast290.B2D-6D4-349 csrss.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0409-1000-0000000FF1CE}\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\THIRDPARTYLICENSEREADME-JAVAFX.txt.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\psfont.properties.ja csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\ffjcext.zip csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\EDGE\EDGE.ELM.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\en\SpreadsheetCompare_col.hxt.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProO365R_SubTrial-pl.xrm-ms csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_OEM_Perp-ul-oob.xrm-ms csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_Grace-ul-oob.xrm-ms csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\pt\msipc.dll.mui.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\plugin.properties.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-ui_ja.jar.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPPREARM.EXE.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-selector-ui_zh_CN.jar.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessR_Subscription-pl.xrm-ms.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_Retail-ppd.xrm-ms csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalR_Trial-pl.xrm-ms.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\IRIS\IRIS.ELM csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxhelper.exe.manifest.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\deploy\messages_zh_TW.properties csrss.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\images\cursors\invalid32x32.gif csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL095.XML.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\NETWORK\NETWORK.ELM csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.reconciler.dropins_1.1.200.v20131119-0908.jar.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-spi-actions.jar.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-applemenu_zh_CN.jar.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessR_Retail-pl.xrm-ms csrss.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\ro\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL011.XML.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-text.xml.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365EduCloudEDUR_Subscription-ul-oob.xrm-ms csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_Retail-ul-phn.xrm-ms csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\CHICAGO.XSL.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_Trial-pl.xrm-ms.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdR_Grace-ul-oob.xrm-ms csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogo.contrast-white_scale-100.png csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\JOURNAL\THMBNAIL.PNG.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\security\blacklisted.certs.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial3-ul-oob.xrm-ms csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_Trial2-ul-oob.xrm-ms.payfast290.B2D-6D4-349 csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdR_OEM_Perp-ppd.xrm-ms csrss.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 25 IoCs
pid pid_target Process procid_target 4428 3468 WerFault.exe 85 4528 3468 WerFault.exe 85 4612 3468 WerFault.exe 85 4680 3468 WerFault.exe 85 4768 3468 WerFault.exe 85 5056 3468 WerFault.exe 85 3188 3468 WerFault.exe 85 3964 3468 WerFault.exe 85 4724 3468 WerFault.exe 85 4944 3468 WerFault.exe 85 5060 3468 WerFault.exe 85 4108 3468 WerFault.exe 85 3988 3468 WerFault.exe 85 4432 3468 WerFault.exe 85 4840 3468 WerFault.exe 85 5032 3468 WerFault.exe 85 3788 3468 WerFault.exe 85 1468 3468 WerFault.exe 85 5116 3468 WerFault.exe 85 2280 3468 WerFault.exe 85 3964 3468 WerFault.exe 85 4612 3468 WerFault.exe 85 5072 3468 WerFault.exe 85 1252 3468 WerFault.exe 85 1532 3468 WerFault.exe 85 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI catusvw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI catusvw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI catusvw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7acf67be5628cf690be7ce66283cb76aad3f8ffbd78035a9c8c7c8f064499b57.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7acf67be5628cf690be7ce66283cb76aad3f8ffbd78035a9c8c7c8f064499b57.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7acf67be5628cf690be7ce66283cb76aad3f8ffbd78035a9c8c7c8f064499b57.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 5032 vssadmin.exe 720 vssadmin.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 39E.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c000000010000000400000000080000090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e 39E.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2980 7acf67be5628cf690be7ce66283cb76aad3f8ffbd78035a9c8c7c8f064499b57.exe 2980 7acf67be5628cf690be7ce66283cb76aad3f8ffbd78035a9c8c7c8f064499b57.exe 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2740 Process not Found -
Suspicious behavior: MapViewOfSection 20 IoCs
pid Process 2980 7acf67be5628cf690be7ce66283cb76aad3f8ffbd78035a9c8c7c8f064499b57.exe 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 2740 Process not Found 4424 catusvw -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2740 Process not Found Token: SeCreatePagefilePrivilege 2740 Process not Found Token: SeShutdownPrivilege 2740 Process not Found Token: SeCreatePagefilePrivilege 2740 Process not Found Token: SeShutdownPrivilege 2740 Process not Found Token: SeCreatePagefilePrivilege 2740 Process not Found Token: SeShutdownPrivilege 2740 Process not Found Token: SeCreatePagefilePrivilege 2740 Process not Found Token: SeShutdownPrivilege 2740 Process not Found Token: SeCreatePagefilePrivilege 2740 Process not Found Token: SeShutdownPrivilege 2740 Process not Found Token: SeCreatePagefilePrivilege 2740 Process not Found Token: SeShutdownPrivilege 2740 Process not Found Token: SeCreatePagefilePrivilege 2740 Process not Found Token: SeDebugPrivilege 2972 AdvancedRun.exe Token: SeImpersonatePrivilege 2972 AdvancedRun.exe Token: SeDebugPrivilege 3344 AdvancedRun.exe Token: SeImpersonatePrivilege 3344 AdvancedRun.exe Token: SeDebugPrivilege 3968 39E.exe Token: SeDebugPrivilege 3968 39E.exe Token: SeDebugPrivilege 3860 ED.exe Token: SeDebugPrivilege 996 powershell.exe Token: SeDebugPrivilege 3592 powershell.exe Token: SeDebugPrivilege 528 F7F2.exe Token: SeDebugPrivilege 2116 FF46.exe Token: SeRestorePrivilege 4428 WerFault.exe Token: SeBackupPrivilege 4428 WerFault.exe Token: SeBackupPrivilege 4428 WerFault.exe Token: SeDebugPrivilege 4428 WerFault.exe Token: SeDebugPrivilege 4528 WerFault.exe Token: SeDebugPrivilege 4612 WerFault.exe Token: SeDebugPrivilege 4680 WerFault.exe Token: SeDebugPrivilege 1072 aspnet_compiler.exe Token: SeDebugPrivilege 4768 WerFault.exe Token: SeDebugPrivilege 5056 WerFault.exe Token: SeDebugPrivilege 3188 WerFault.exe Token: SeDebugPrivilege 3964 WerFault.exe Token: SeDebugPrivilege 4724 Process not Found Token: SeDebugPrivilege 4944 WerFault.exe Token: SeDebugPrivilege 5060 WerFault.exe Token: SeDebugPrivilege 4108 WerFault.exe Token: SeDebugPrivilege 3988 WerFault.exe Token: SeShutdownPrivilege 2740 Process not Found Token: SeCreatePagefilePrivilege 2740 Process not Found Token: SeShutdownPrivilege 2740 Process not Found Token: SeCreatePagefilePrivilege 2740 Process not Found Token: SeShutdownPrivilege 2740 Process not Found Token: SeCreatePagefilePrivilege 2740 Process not Found Token: SeShutdownPrivilege 2740 Process not Found Token: SeCreatePagefilePrivilege 2740 Process not Found Token: SeShutdownPrivilege 2740 Process not Found Token: SeCreatePagefilePrivilege 2740 Process not Found Token: SeShutdownPrivilege 2740 Process not Found Token: SeCreatePagefilePrivilege 2740 Process not Found Token: SeShutdownPrivilege 2740 Process not Found Token: SeCreatePagefilePrivilege 2740 Process not Found Token: SeShutdownPrivilege 2740 Process not Found Token: SeCreatePagefilePrivilege 2740 Process not Found Token: SeShutdownPrivilege 2740 Process not Found Token: SeCreatePagefilePrivilege 2740 Process not Found Token: SeDebugPrivilege 4432 WerFault.exe Token: SeDebugPrivilege 4840 WerFault.exe Token: SeShutdownPrivilege 2740 Process not Found Token: SeCreatePagefilePrivilege 2740 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2740 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 856 wrote to memory of 2980 856 7acf67be5628cf690be7ce66283cb76aad3f8ffbd78035a9c8c7c8f064499b57.exe 77 PID 856 wrote to memory of 2980 856 7acf67be5628cf690be7ce66283cb76aad3f8ffbd78035a9c8c7c8f064499b57.exe 77 PID 856 wrote to memory of 2980 856 7acf67be5628cf690be7ce66283cb76aad3f8ffbd78035a9c8c7c8f064499b57.exe 77 PID 856 wrote to memory of 2980 856 7acf67be5628cf690be7ce66283cb76aad3f8ffbd78035a9c8c7c8f064499b57.exe 77 PID 856 wrote to memory of 2980 856 7acf67be5628cf690be7ce66283cb76aad3f8ffbd78035a9c8c7c8f064499b57.exe 77 PID 856 wrote to memory of 2980 856 7acf67be5628cf690be7ce66283cb76aad3f8ffbd78035a9c8c7c8f064499b57.exe 77 PID 2740 wrote to memory of 528 2740 Process not Found 79 PID 2740 wrote to memory of 528 2740 Process not Found 79 PID 2740 wrote to memory of 528 2740 Process not Found 79 PID 2740 wrote to memory of 2116 2740 Process not Found 81 PID 2740 wrote to memory of 2116 2740 Process not Found 81 PID 2740 wrote to memory of 2116 2740 Process not Found 81 PID 2740 wrote to memory of 3860 2740 Process not Found 83 PID 2740 wrote to memory of 3860 2740 Process not Found 83 PID 2740 wrote to memory of 3860 2740 Process not Found 83 PID 2740 wrote to memory of 3968 2740 Process not Found 84 PID 2740 wrote to memory of 3968 2740 Process not Found 84 PID 2740 wrote to memory of 3968 2740 Process not Found 84 PID 2740 wrote to memory of 3468 2740 Process not Found 85 PID 2740 wrote to memory of 3468 2740 Process not Found 85 PID 2740 wrote to memory of 3468 2740 Process not Found 85 PID 2740 wrote to memory of 2424 2740 Process not Found 86 PID 2740 wrote to memory of 2424 2740 Process not Found 86 PID 2740 wrote to memory of 2424 2740 Process not Found 86 PID 2740 wrote to memory of 2424 2740 Process not Found 86 PID 2740 wrote to memory of 1252 2740 Process not Found 87 PID 2740 wrote to memory of 1252 2740 Process not Found 87 PID 2740 wrote to memory of 1252 2740 Process not Found 87 PID 3860 wrote to memory of 2972 3860 ED.exe 88 PID 3860 wrote to memory of 2972 3860 ED.exe 88 PID 3860 wrote to memory of 2972 3860 ED.exe 88 PID 2740 wrote to memory of 1232 2740 Process not Found 89 PID 2740 wrote to memory of 1232 2740 Process not Found 89 PID 2740 wrote to memory of 1232 2740 Process not Found 89 PID 2740 wrote to memory of 1232 2740 Process not Found 89 PID 2972 wrote to memory of 3344 2972 AdvancedRun.exe 90 PID 2972 wrote to memory of 3344 2972 AdvancedRun.exe 90 PID 2972 wrote to memory of 3344 2972 AdvancedRun.exe 90 PID 2740 wrote to memory of 3960 2740 Process not Found 92 PID 2740 wrote to memory of 3960 2740 Process not Found 92 PID 2740 wrote to memory of 3960 2740 Process not Found 92 PID 2740 wrote to memory of 856 2740 Process not Found 93 PID 2740 wrote to memory of 856 2740 Process not Found 93 PID 2740 wrote to memory of 856 2740 Process not Found 93 PID 2740 wrote to memory of 856 2740 Process not Found 93 PID 2740 wrote to memory of 816 2740 Process not Found 94 PID 2740 wrote to memory of 816 2740 Process not Found 94 PID 2740 wrote to memory of 816 2740 Process not Found 94 PID 3968 wrote to memory of 1244 3968 39E.exe 95 PID 3968 wrote to memory of 1244 3968 39E.exe 95 PID 3968 wrote to memory of 1244 3968 39E.exe 95 PID 3968 wrote to memory of 2308 3968 39E.exe 96 PID 3968 wrote to memory of 2308 3968 39E.exe 96 PID 3968 wrote to memory of 2308 3968 39E.exe 96 PID 3968 wrote to memory of 2308 3968 39E.exe 96 PID 3968 wrote to memory of 2308 3968 39E.exe 96 PID 3968 wrote to memory of 2308 3968 39E.exe 96 PID 3860 wrote to memory of 3592 3860 ED.exe 97 PID 3860 wrote to memory of 3592 3860 ED.exe 97 PID 3860 wrote to memory of 3592 3860 ED.exe 97 PID 3860 wrote to memory of 996 3860 ED.exe 99 PID 3860 wrote to memory of 996 3860 ED.exe 99 PID 3860 wrote to memory of 996 3860 ED.exe 99 PID 3860 wrote to memory of 1072 3860 ED.exe 101 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ED.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7acf67be5628cf690be7ce66283cb76aad3f8ffbd78035a9c8c7c8f064499b57.exe"C:\Users\Admin\AppData\Local\Temp\7acf67be5628cf690be7ce66283cb76aad3f8ffbd78035a9c8c7c8f064499b57.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\7acf67be5628cf690be7ce66283cb76aad3f8ffbd78035a9c8c7c8f064499b57.exe"C:\Users\Admin\AppData\Local\Temp\7acf67be5628cf690be7ce66283cb76aad3f8ffbd78035a9c8c7c8f064499b57.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2980
-
-
C:\Users\Admin\AppData\Local\Temp\F7F2.exeC:\Users\Admin\AppData\Local\Temp\F7F2.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:528
-
C:\Users\Admin\AppData\Local\Temp\FF46.exeC:\Users\Admin\AppData\Local\Temp\FF46.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
C:\Users\Admin\AppData\Local\Temp\ED.exeC:\Users\Admin\AppData\Local\Temp\ED.exe1⤵
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\109343c9-6beb-4adc-87e0-13a7099afef4\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\109343c9-6beb-4adc-87e0-13a7099afef4\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\109343c9-6beb-4adc-87e0-13a7099afef4\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\109343c9-6beb-4adc-87e0-13a7099afef4\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\109343c9-6beb-4adc-87e0-13a7099afef4\AdvancedRun.exe" /SpecialRun 4101d8 29723⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3344
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ED.exe" -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3592
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ED.exe" -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:996
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
C:\Users\Admin\AppData\Local\Temp\39E.exeC:\Users\Admin\AppData\Local\Temp\39E.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe" -start2⤵
- Executes dropped EXE
- Enumerates connected drives
PID:1244 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵PID:4832
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:5040
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:4680
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:3748
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:4812
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵PID:4764
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:5032
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat3⤵PID:4836
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:1888
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:720
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe" -agent 03⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4988
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵PID:2308
-
-
C:\Users\Admin\AppData\Local\Temp\5C1.exeC:\Users\Admin\AppData\Local\Temp\5C1.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 7362⤵
- Drops file in Windows directory
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 7482⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 8482⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 8842⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 11882⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 12642⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 7882⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 12762⤵
- Program crash
PID:3964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 13442⤵
- Program crash
PID:4724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 13802⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 14602⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 15322⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 15722⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 12402⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 16762⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 13002⤵
- Program crash
PID:5032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 13282⤵
- Program crash
PID:3788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 17042⤵
- Program crash
PID:1468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 17562⤵
- Program crash
PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 17322⤵
- Program crash
PID:2280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 18122⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 17802⤵
- Program crash
PID:4612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 19442⤵
- Program crash
PID:5072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 16842⤵
- Program crash
PID:1252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 12362⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:1532
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2424
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1252
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1232
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3960
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:856
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:816
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3232
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4232
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4336
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:204
-
C:\Users\Admin\AppData\Roaming\catusvwC:\Users\Admin\AppData\Roaming\catusvw1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1144 -
C:\Users\Admin\AppData\Roaming\catusvwC:\Users\Admin\AppData\Roaming\catusvw2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4424
-
Network
MITRE ATT&CK Enterprise v6
Defense Evasion
Bypass User Account Control
1Disabling Security Tools
4File Deletion
2Install Root Certificate
1Modify Registry
7Virtualization/Sandbox Evasion
1Web Service
1