Analysis
-
max time kernel
1806s -
max time network
1848s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
28-09-2021 20:53
Static task
static1
Behavioral task
behavioral1
Sample
test.test.dll
Resource
win7v20210408
Behavioral task
behavioral2
Sample
test.test.dll
Resource
win11
Behavioral task
behavioral3
Sample
test.test.dll
Resource
win10v20210408
General
-
Target
test.test.dll
-
Size
355KB
-
MD5
ed3b43ef66f58f891cc51cacc79b0b72
-
SHA1
02cfa19d275c96fafad6b3e440b220200b839f99
-
SHA256
9c5c2af628233f118a88fb03f859e0f92f4393c8dd7c8204afe15af161f568c7
-
SHA512
73913ebf9895625de2b4a4e5c4534164f79b708bfc1338aade1d90aae57836bd7ea79e2a32976b138d8d5ab1d877ec5997428461acb588e732ec49ab8235d116
Malware Config
Extracted
qakbot
402.343
tr
1632730751
95.77.223.148:443
47.22.148.6:443
89.101.97.139:443
27.223.92.142:995
120.151.47.189:443
136.232.34.70:443
120.150.218.241:995
185.250.148.74:443
181.118.183.94:443
140.82.49.12:443
67.165.206.193:993
103.148.120.144:443
71.74.12.34:443
76.25.142.196:443
73.151.236.31:443
173.21.10.71:2222
75.188.35.168:443
2.178.88.145:61202
71.80.168.245:443
45.46.53.140:2222
109.12.111.14:443
105.198.236.99:443
73.77.87.137:443
41.248.239.221:995
182.176.112.182:443
96.37.113.36:993
75.66.88.33:443
162.244.227.34:443
24.229.150.54:995
216.201.162.158:443
92.59.35.196:2222
196.218.227.241:995
24.139.72.117:443
68.207.102.78:443
72.252.201.69:443
2.188.27.77:443
177.130.82.197:2222
68.204.7.158:443
189.210.115.207:443
181.163.96.53:443
24.55.112.61:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
24.152.219.253:995
50.29.166.232:995
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 328 regsvr32.exe 268 regsvr32.exe -
Drops file in System32 directory 6 IoCs
Processes:
explorer.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357 explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357 explorer.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\t4[1] explorer.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xkfodbkosfwrm\8c0ecbce = f0da6d4d4dddb64c22daf2e3a16e1db9b1624ac540a358e2dec5e6a14a6048a6b3dc8b7bec57ca9860e057a27a8b06f070f3e6037db42b2670bb2b661e04bc53ad74c9d19b3d789e6b60055c80a154635a19cbbd4f376ffbf1fd explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadDecision = "0" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xkfodbkosfwrm\c6d87476 = f8cc6821658814d4d755c5680a703c4fc4be8f8147f60ecf91936b1a1be76258028708147f6019ec6a7aff88e0e2a95f2388d86dcf61adcc8a8b8d9442d9c96c8b1b509cdc02d5f29ff3ed5ba3c99460e573ef132e52ffb08304223e95fab18354256ef35ea1b843aa explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\5e-5a-6f-87-e2-f1\WpadDecisionTime = 20ea5d1abdb4d701 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadDecisionTime = c06058ebbcb4d701 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xkfodbkosfwrm\bbd03bfc = a2ae14770981c64e479632cf579df919f2dd4f5a5997b6732c3a3de57fbf07b089805d9d6d965efa explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xkfodbkosfwrm\7e641313 = 6f39bb72a8cad213d5739356fc0bce6fd989421090e0800939d0b59081bfae3004c117b8388788c9da0c1acae824dc20fff3fe7cecfd2cd42bfe673bfb3ba9 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xkfodbkosfwrm\f347a438 = 031d2c312cfcddad8594b9a7fde66450b9cd88a5e49504ff16c77476c86ef50e4ecc1dd8756c48c010b3985383a8b6efde1d25da85974881afdac42f319ce4b586e7564f5b204e899bb1c96c7004e4926e22eaa102 explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xkfodbkosfwrm\8c0ecbce = f0da6d4d4dddb64c22daf2e3a16e1db9b0624ec340a358e2dec5e6a14a6048a6b2db8179ec57ca9860e057a27a8b06f070f3e6037db42b2670bb2b661e04bc53ad74c9d19b3d789e6b60055c80a154635a19cbbd4f376ffbf1fd explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xkfodbkosfwrm\8c0ecbce = f0da6d4d4dddb64c22daf2e3a16e1db9b0624ec340a358e2dec5e6a14a6048a6b2d98370ec57ca9860e057a27a8b06f070f3e6037db42b2670bb2b661e04bc53ad74c9d19b3d789e6b60055c80a154635a19cbbd4f376ffbf1fd explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadDecisionReason = "1" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000005000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a070026000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000006000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a070026000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xkfodbkosfwrm\8c0ecbce = f0da6d4d4dddb64c22daf2e3a16e1db9b0674ccc40a358e2dec5e6a14a6048a6b2dd8171ec57ca9860e057a27a8b06f070f3e6037db42b2670bb2b661e04bc53ad74c9d19b3d789e6b60055c80a154635a19cbbd4f376ffbf1fd explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a070026000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\5e-5a-6f-87-e2-f1\WpadDecisionTime = c06058ebbcb4d701 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a070026000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\5e-5a-6f-87-e2-f1 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadDecisionTime = a08b4250bdb4d701 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xkfodbkosfwrm\8c0ecbce = f0da6d4d4dddb64c22daf2e3a16e1db9b16748c540a358e2dec5e6a14a6048a6b3dc8b7bec57ca9860e057a27a8b06f070f3e6037db42b2670bb2b661e04bc53ad74c9d19b3d789e6b60055c80a154635a19cbbd4f376ffbf1fd explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\5e-5a-6f-87-e2-f1\WpadDetectedUrl explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xkfodbkosfwrm\8c0ecbce = f0da6d4d4dddb64c22daf2e3a16e1db9b0624ec340a358e2dec5e6a14a6048a6b2dd8171ec57ca9860e057a27a8b06f070f3e6037db42b2670bb2b661e04bc53ad74c9d19b3d789e6b60055c80a154635a19cbbd4f376ffbf1fd explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xkfodbkosfwrm\b9911b80 = 09da09b18d3ea4065db8d1b0180f0e14ac985e28c5446819c6198daad2a139cffe5180f8436c8c4bbc8151552a74988be7df9252b6292fec75a0cc8229dabccee4c69486987e523645950152d1ea9e1b1f6226bde4c5913d810220f78d8094b019d722f1ab5c129f5a4866 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xkfodbkosfwrm\36c5c99 = 9810960a76a8498009d65498dd4111558a782f25cfabf42f explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xkfodbkosfwrm\8c0ecbce = f0da644d4dddb64c22daf3a9a16717bfbb674ec60ea855e9d6cbe09785a121f03eee2afe874d39c1c1179a8bfa0e4154f51ce54dc90c8c0c8fbf0f74039bd44689c2ea6d2c46e1a0c746f3548b4180a5b1 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 1932 rundll32.exe 328 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 1932 rundll32.exe 328 regsvr32.exe -
Suspicious use of WriteProcessMemory 55 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exetaskeng.exeregsvr32.exeregsvr32.exeexplorer.exetaskeng.exeregsvr32.exedescription pid process target process PID 1916 wrote to memory of 1932 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 1932 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 1932 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 1932 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 1932 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 1932 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 1932 1916 rundll32.exe rundll32.exe PID 1932 wrote to memory of 2012 1932 rundll32.exe explorer.exe PID 1932 wrote to memory of 2012 1932 rundll32.exe explorer.exe PID 1932 wrote to memory of 2012 1932 rundll32.exe explorer.exe PID 1932 wrote to memory of 2012 1932 rundll32.exe explorer.exe PID 1932 wrote to memory of 2012 1932 rundll32.exe explorer.exe PID 1932 wrote to memory of 2012 1932 rundll32.exe explorer.exe PID 2012 wrote to memory of 1764 2012 explorer.exe schtasks.exe PID 2012 wrote to memory of 1764 2012 explorer.exe schtasks.exe PID 2012 wrote to memory of 1764 2012 explorer.exe schtasks.exe PID 2012 wrote to memory of 1764 2012 explorer.exe schtasks.exe PID 1476 wrote to memory of 268 1476 taskeng.exe regsvr32.exe PID 1476 wrote to memory of 268 1476 taskeng.exe regsvr32.exe PID 1476 wrote to memory of 268 1476 taskeng.exe regsvr32.exe PID 1476 wrote to memory of 268 1476 taskeng.exe regsvr32.exe PID 1476 wrote to memory of 268 1476 taskeng.exe regsvr32.exe PID 268 wrote to memory of 328 268 regsvr32.exe regsvr32.exe PID 268 wrote to memory of 328 268 regsvr32.exe regsvr32.exe PID 268 wrote to memory of 328 268 regsvr32.exe regsvr32.exe PID 268 wrote to memory of 328 268 regsvr32.exe regsvr32.exe PID 268 wrote to memory of 328 268 regsvr32.exe regsvr32.exe PID 268 wrote to memory of 328 268 regsvr32.exe regsvr32.exe PID 268 wrote to memory of 328 268 regsvr32.exe regsvr32.exe PID 328 wrote to memory of 1524 328 regsvr32.exe explorer.exe PID 328 wrote to memory of 1524 328 regsvr32.exe explorer.exe PID 328 wrote to memory of 1524 328 regsvr32.exe explorer.exe PID 328 wrote to memory of 1524 328 regsvr32.exe explorer.exe PID 328 wrote to memory of 1524 328 regsvr32.exe explorer.exe PID 328 wrote to memory of 1524 328 regsvr32.exe explorer.exe PID 1524 wrote to memory of 1680 1524 explorer.exe reg.exe PID 1524 wrote to memory of 1680 1524 explorer.exe reg.exe PID 1524 wrote to memory of 1680 1524 explorer.exe reg.exe PID 1524 wrote to memory of 1680 1524 explorer.exe reg.exe PID 1524 wrote to memory of 1556 1524 explorer.exe reg.exe PID 1524 wrote to memory of 1556 1524 explorer.exe reg.exe PID 1524 wrote to memory of 1556 1524 explorer.exe reg.exe PID 1524 wrote to memory of 1556 1524 explorer.exe reg.exe PID 1436 wrote to memory of 1812 1436 taskeng.exe regsvr32.exe PID 1436 wrote to memory of 1812 1436 taskeng.exe regsvr32.exe PID 1436 wrote to memory of 1812 1436 taskeng.exe regsvr32.exe PID 1436 wrote to memory of 1812 1436 taskeng.exe regsvr32.exe PID 1436 wrote to memory of 1812 1436 taskeng.exe regsvr32.exe PID 1812 wrote to memory of 268 1812 regsvr32.exe regsvr32.exe PID 1812 wrote to memory of 268 1812 regsvr32.exe regsvr32.exe PID 1812 wrote to memory of 268 1812 regsvr32.exe regsvr32.exe PID 1812 wrote to memory of 268 1812 regsvr32.exe regsvr32.exe PID 1812 wrote to memory of 268 1812 regsvr32.exe regsvr32.exe PID 1812 wrote to memory of 268 1812 regsvr32.exe regsvr32.exe PID 1812 wrote to memory of 268 1812 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\test.test.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\test.test.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn uuyhwpeik /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\test.test.dll\"" /SC ONCE /Z /ST 22:56 /ET 23:084⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {0801E0A9-E956-43CB-B8AD-141EFCC03A72} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\test.test.dll"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\test.test.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Jrplyx" /d "0"5⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Jovklpa" /d "0"5⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {8615C805-D5A0-448C-8408-2160BBF0EC32} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\test.test.dll"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\test.test.dll"3⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\test.test.dllMD5
ed3b43ef66f58f891cc51cacc79b0b72
SHA102cfa19d275c96fafad6b3e440b220200b839f99
SHA2569c5c2af628233f118a88fb03f859e0f92f4393c8dd7c8204afe15af161f568c7
SHA51273913ebf9895625de2b4a4e5c4534164f79b708bfc1338aade1d90aae57836bd7ea79e2a32976b138d8d5ab1d877ec5997428461acb588e732ec49ab8235d116
-
C:\Users\Admin\AppData\Local\Temp\test.test.dllMD5
be56d29ed56450429b8d40273069cc9c
SHA1a26047dd850a35ef45ca88edc38974f82e9aae25
SHA25614d4f467577596a1de42704b686762853877f16620ce8d81b2b7839bc04363d0
SHA5126ed1ca608c0f62b3bc5515c67e79561a51968af6062a204ccd08e75489d81300189d237d232910a91afbae693092bb3908331add6deb5167faa871dd67f04d36
-
\??\PIPE\wkssvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\Temp\test.test.dllMD5
ed3b43ef66f58f891cc51cacc79b0b72
SHA102cfa19d275c96fafad6b3e440b220200b839f99
SHA2569c5c2af628233f118a88fb03f859e0f92f4393c8dd7c8204afe15af161f568c7
SHA51273913ebf9895625de2b4a4e5c4534164f79b708bfc1338aade1d90aae57836bd7ea79e2a32976b138d8d5ab1d877ec5997428461acb588e732ec49ab8235d116
-
\Users\Admin\AppData\Local\Temp\test.test.dllMD5
be56d29ed56450429b8d40273069cc9c
SHA1a26047dd850a35ef45ca88edc38974f82e9aae25
SHA25614d4f467577596a1de42704b686762853877f16620ce8d81b2b7839bc04363d0
SHA5126ed1ca608c0f62b3bc5515c67e79561a51968af6062a204ccd08e75489d81300189d237d232910a91afbae693092bb3908331add6deb5167faa871dd67f04d36
-
memory/268-87-0x0000000000000000-mapping.dmp
-
memory/268-69-0x0000000000000000-mapping.dmp
-
memory/268-70-0x000007FEFBC41000-0x000007FEFBC43000-memory.dmpFilesize
8KB
-
memory/328-72-0x0000000000000000-mapping.dmp
-
memory/328-80-0x00000000002C0000-0x0000000000303000-memory.dmpFilesize
268KB
-
memory/328-81-0x0000000010000000-0x0000000010055000-memory.dmpFilesize
340KB
-
memory/1524-82-0x0000000000080000-0x00000000000A1000-memory.dmpFilesize
132KB
-
memory/1524-75-0x0000000000000000-mapping.dmp
-
memory/1556-83-0x0000000000000000-mapping.dmp
-
memory/1680-79-0x0000000000000000-mapping.dmp
-
memory/1764-67-0x0000000000000000-mapping.dmp
-
memory/1812-84-0x0000000000000000-mapping.dmp
-
memory/1932-60-0x0000000000000000-mapping.dmp
-
memory/1932-62-0x00000000002F0000-0x0000000000333000-memory.dmpFilesize
268KB
-
memory/1932-63-0x0000000010000000-0x0000000010055000-memory.dmpFilesize
340KB
-
memory/1932-61-0x0000000075201000-0x0000000075203000-memory.dmpFilesize
8KB
-
memory/2012-68-0x0000000000080000-0x00000000000A1000-memory.dmpFilesize
132KB
-
memory/2012-66-0x0000000074951000-0x0000000074953000-memory.dmpFilesize
8KB
-
memory/2012-64-0x0000000000000000-mapping.dmp