Analysis
-
max time kernel
1798s -
max time network
1805s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
28-09-2021 20:53
Static task
static1
Behavioral task
behavioral1
Sample
test.test.dll
Resource
win7v20210408
Behavioral task
behavioral2
Sample
test.test.dll
Resource
win11
Behavioral task
behavioral3
Sample
test.test.dll
Resource
win10v20210408
General
-
Target
test.test.dll
-
Size
355KB
-
MD5
ed3b43ef66f58f891cc51cacc79b0b72
-
SHA1
02cfa19d275c96fafad6b3e440b220200b839f99
-
SHA256
9c5c2af628233f118a88fb03f859e0f92f4393c8dd7c8204afe15af161f568c7
-
SHA512
73913ebf9895625de2b4a4e5c4534164f79b708bfc1338aade1d90aae57836bd7ea79e2a32976b138d8d5ab1d877ec5997428461acb588e732ec49ab8235d116
Malware Config
Extracted
qakbot
402.343
tr
1632730751
95.77.223.148:443
47.22.148.6:443
89.101.97.139:443
27.223.92.142:995
120.151.47.189:443
136.232.34.70:443
120.150.218.241:995
185.250.148.74:443
181.118.183.94:443
140.82.49.12:443
67.165.206.193:993
103.148.120.144:443
71.74.12.34:443
76.25.142.196:443
73.151.236.31:443
173.21.10.71:2222
75.188.35.168:443
2.178.88.145:61202
71.80.168.245:443
45.46.53.140:2222
109.12.111.14:443
105.198.236.99:443
73.77.87.137:443
41.248.239.221:995
182.176.112.182:443
96.37.113.36:993
75.66.88.33:443
162.244.227.34:443
24.229.150.54:995
216.201.162.158:443
92.59.35.196:2222
196.218.227.241:995
24.139.72.117:443
68.207.102.78:443
72.252.201.69:443
2.188.27.77:443
177.130.82.197:2222
68.204.7.158:443
189.210.115.207:443
181.163.96.53:443
24.55.112.61:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
24.152.219.253:995
50.29.166.232:995
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 3576 regsvr32.exe 3048 regsvr32.exe -
Drops file in System32 directory 6 IoCs
Processes:
explorer.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 explorer.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\t4[1] explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies explorer.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3396 3048 WerFault.exe regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ocqiobsviqout\f93f8285 = b6936353d780d06fc1261141ea853784a4b6c870abce267e5f56cdd06f0b2ae05427d19d04f302edf2a7ba083be4bd44a2e3f5f56c5474ef1f6e970a95e73b95b6066f5c2c0b8848ff422a814223df3c53428ec8954d0feb5ccf02b916849785350765e0b2494234adae2c4d3226fd6082203386 explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ocqiobsviqout explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ocqiobsviqout\cca052cb = e0d32fba6cbd1cb9c058c4fd02003ebb5bf3400aad8ba75fbd78ba77aa62bf4c5b1a1911d618967b3c5b576ec3947d357cb0897c5dc09fe1a5b44a675477a32f9c831dd9b1339ae54f5b123a43cec5df6fb29bc2254da04e4ad6d2bae430eed80e19a2fd4fbceef0c473821490ed0e176ade854917f612cd0d8fe4504ca1f6d0e270f745375ffc7f59 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ocqiobsviqout\cee172b7 = ed0130bd48522c8c683af532d0ee22b887ccf189ee6514c0b509d675a0be85fdc45545afde1f5ab810b27e0ae75a124ee68f7e3b526a3cb40ccfeecc34f667d373cb42c4d67a7cb6bd8b7325069e651ee8f8831ee4daab89bd76 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ocqiobsviqout\f93f8285 = b6936a53d780d06fc126100bea8c3d83acb6c77ae5c52b7e5b5dc8e664477d4605b4143ae888c98b2e817262a9e821a0d42b50a1a73b2b63cd47c7c7617767a2eaae9938a464bed00a0a7266ae482789da56feeda22a3a16d59fc677cb97590ca23deb34eaa995dcf1b0c95f2ba40ae466721ae1d2d5dbacdaa43222a1 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ocqiobsviqout\f93f8285 = b6936a53d780d06fc126100bea8c3d83acbfcd70e5c52b7e5b5dc8e664477d4602b0133ae888c98b2e817262a9e821a0d42b50a1a73b2b63cd47c7c7617767a2eaae9938a464bed00a0a7266ae482789da56feeda22a3a16d59fc677cb97590ca23deb34eaa995dcf1b0c95f2ba40ae466721ae1d2d5dbacdaa43222a1 explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ocqiobsviqout\f93f8285 = b6936a53d780d06fc126100bea8c3d83acb6c77ae5c52b7e5b5dc8e664477d4605b0163ce888c98b2e817262a9e821a0d42b50a1a73b2b63cd47c7c7617767a2eaae9938a464bed00a0a7266ae482789da56feeda22a3a16d59fc677cb97590ca23deb34eaa995dcf1b0c95f2ba40ae466721ae1d2d5dbacdaa43222a1 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ocqiobsviqout\f93f8285 = b6937453d780e56c8e72b15f7e4e9059dc32f70fdd998a4b8ab9a8afd3947e215e3f728bbe649b2b7fd75d9d17a4d2b17d90b8b37a4f8ce0536001033311596d82d76a27fd06866fe1f02af4ef17fedf1d9fa4b1c9621c2eb4269fb9e0e211 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ocqiobsviqout\f93f8285 = b6936a53d780d06fc126100bea8c3d83abb6cb73e5c52b7e5b5dc8e664477d4602b0133ae888c98b2e817262a9e821a0d42b50a1a73b2b63cd47c7c7617767a2eaae9938a464bed00a0a7266ae482789da56feeda22a3a16d59fc677cb97590ca23deb34eaa995dcf1b0c95f2ba40ae466721ae1d2d5dbacdaa43222a1 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ocqiobsviqout\f93f8285 = b6936a53d780d06fc126100bea8c3d83adbfc676e5c52b7e5b5dc8e664477d4605b0163ce888c98b2e817262a9e821a0d42b50a1a73b2b63cd47c7c7617767a2eaae9938a464bed00a0a7266ae482789da56feeda22a3a16d59fc677cb97590ca23deb34eaa995dcf1b0c95f2ba40ae466721ae1d2d5dbacdaa43222a1 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ocqiobsviqout\b555a58 = de63abcb4421a41c9213ab5801234a0879468cc311493d8a7eb93fe81c79013f48bb446cd04be723f16b188483b0216f05b33f5c6dd206cd9b7b42b7e39c00f28f358d38ddd4 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ocqiobsviqout\f93f8285 = b6936a53d780d06fc126100bea8c3d83acb2cf75e5c52b7e5b5dc8e664477d4605b6153ce888c98b2e817262a9e821a0d42b50a1a73b2b63cd47c7c7617767a2eaae9938a464bed00a0a7266ae482789da56feeda22a3a16d59fc677cb97590ca23deb34eaa995dcf1b0c95f2ba40ae466721ae1d2d5dbacdaa43222a1 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ocqiobsviqout\f93f8285 = b6936a53d780d06fc126100bea8c3d83acbfcd70e5c52b7e5b5dc8e664477d4605b8123be888c98b2e817262a9e821a0d42b50a1a73b2b63cd47c7c7617767a2eaae9938a464bed00a0a7266ae482789da56feeda22a3a16d59fc677cb97590ca23deb34eaa995dcf1b0c95f2ba40ae466721ae1d2d5dbacdaa43222a1 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ocqiobsviqout\f93f8285 = b6936a53d780d06fc126100bea8c3d83abb6cb73e5c52b7e5b5dc8e664477d4602b2103ce888c98b2e817262a9e821a0d42b50a1a73b2b63cd47c7c7617767a2eaae9938a464bed00a0a7266ae482789da56feeda22a3a16d59fc677cb97590ca23deb34eaa995dcf1b0c95f2ba40ae466721ae1d2d5dbacdaa43222a1 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ocqiobsviqout\b3e93d3d = 3684f71e1e3583c0affa20279ecd1eaacad5f9f9f99c1f0a4b8baa42cd2e911d0ebc743d7c6e30e2095854e21868682eb03bbc35f022e05ff5b63716f2d14f1c5625b24aa81f1f866d3b40954bfdc9 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ocqiobsviqout\741c35ae = e7bb8da034949bd72f0e6db9f5e405851721f3a1ac3f0decd53fdf2f9057278bf9ea19305258a76e8bb34f5584461191fc6aca27f7 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ocqiobsviqout\f93f8285 = b6936a53d780d06fc126100bea8c3d83adbfc676e5c52b7e5b5dc8e664477d4604b8193de888c98b2e817262a9e821a0d42b50a1a73b2b63cd47c7c7617767a2eaae9938a464bed00a0a7266ae482789da56feeda22a3a16d59fc677cb97590ca23deb34eaa995dcf1b0c95f2ba40ae466721ae1d2d5dbacdaa43222a1 explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ocqiobsviqout\f93f8285 = b6936a53d780d06fc126100bea8c3d83acb6c77ae5c52b7e5b5dc8e664477d4605b2173be888c98b2e817262a9e821a0d42b50a1a73b2b63cd47c7c7617767a2eaae9938a464bed00a0a7266ae482789da56feeda22a3a16d59fc677cb97590ca23deb34eaa995dcf1b0c95f2ba40ae466721ae1d2d5dbacdaa43222a1 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ocqiobsviqout\f93f8285 = b6936a53d780d06fc126100bea8c3d83acb2cf75e5c52b7e5b5dc8e664477d4605b4143ae888c98b2e817262a9e821a0d42b50a1a73b2b63cd47c7c7617767a2eaae9938a464bed00a0a7266ae482789da56feeda22a3a16d59fc677cb97590ca23deb34eaa995dcf1b0c95f2ba40ae466721ae1d2d5dbacdaa43222a1 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ocqiobsviqout\765d15d2 = d69e4de22728cdfe1bf366e78a31abe3d8bd7ec2dfad1b9d215eac0f8ac4be1c2ec1b32f8184f360265a44b80717b7d17a52de2dd877d39282b05a0e8c8f9fe1e98e80cfd9f829876d9d3a explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ocqiobsviqout\8676ed73 = 8079c0507d234e5bf0ad8475a698c9539fac2e464ca31602ced35774ee explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ocqiobsviqout\f93f8285 = b6936353d780d06fc1261141ea853784a4b6c870abce267e5c5fcad06f0b2ae05427d19d04f302edf2a7ba083be4bd44a2e3f5f56c5474ef1f6e970a95e73b95b6066f5c2c0b8848ff422a814223df3c53428ec8954d0feb5ccf02b916849785350765e0b2494234adae2c4d3226fd6082203386 explorer.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
rundll32.exeregsvr32.exeWerFault.exepid process 2844 rundll32.exe 2844 rundll32.exe 3576 regsvr32.exe 3576 regsvr32.exe 3396 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 2844 rundll32.exe 3576 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3396 WerFault.exe Token: SeBackupPrivilege 3396 WerFault.exe Token: SeDebugPrivilege 3396 WerFault.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exeregsvr32.exeregsvr32.exeexplorer.exeregsvr32.exedescription pid process target process PID 2276 wrote to memory of 2844 2276 rundll32.exe rundll32.exe PID 2276 wrote to memory of 2844 2276 rundll32.exe rundll32.exe PID 2276 wrote to memory of 2844 2276 rundll32.exe rundll32.exe PID 2844 wrote to memory of 2504 2844 rundll32.exe explorer.exe PID 2844 wrote to memory of 2504 2844 rundll32.exe explorer.exe PID 2844 wrote to memory of 2504 2844 rundll32.exe explorer.exe PID 2844 wrote to memory of 2504 2844 rundll32.exe explorer.exe PID 2844 wrote to memory of 2504 2844 rundll32.exe explorer.exe PID 2504 wrote to memory of 2756 2504 explorer.exe schtasks.exe PID 2504 wrote to memory of 2756 2504 explorer.exe schtasks.exe PID 2504 wrote to memory of 2756 2504 explorer.exe schtasks.exe PID 4024 wrote to memory of 3576 4024 regsvr32.exe regsvr32.exe PID 4024 wrote to memory of 3576 4024 regsvr32.exe regsvr32.exe PID 4024 wrote to memory of 3576 4024 regsvr32.exe regsvr32.exe PID 3576 wrote to memory of 3668 3576 regsvr32.exe explorer.exe PID 3576 wrote to memory of 3668 3576 regsvr32.exe explorer.exe PID 3576 wrote to memory of 3668 3576 regsvr32.exe explorer.exe PID 3576 wrote to memory of 3668 3576 regsvr32.exe explorer.exe PID 3576 wrote to memory of 3668 3576 regsvr32.exe explorer.exe PID 3668 wrote to memory of 2560 3668 explorer.exe reg.exe PID 3668 wrote to memory of 2560 3668 explorer.exe reg.exe PID 3668 wrote to memory of 1368 3668 explorer.exe reg.exe PID 3668 wrote to memory of 1368 3668 explorer.exe reg.exe PID 2752 wrote to memory of 3048 2752 regsvr32.exe regsvr32.exe PID 2752 wrote to memory of 3048 2752 regsvr32.exe regsvr32.exe PID 2752 wrote to memory of 3048 2752 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\test.test.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\test.test.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn wsnusccdt /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\test.test.dll\"" /SC ONCE /Z /ST 20:55 /ET 21:074⤵
- Creates scheduled task(s)
-
\??\c:\windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\test.test.dll"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\test.test.dll"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Hytfw" /d "0"4⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Bgxvnnmeqg" /d "0"4⤵
-
\??\c:\windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\test.test.dll"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\test.test.dll"2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 6043⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\test.test.dllMD5
ed3b43ef66f58f891cc51cacc79b0b72
SHA102cfa19d275c96fafad6b3e440b220200b839f99
SHA2569c5c2af628233f118a88fb03f859e0f92f4393c8dd7c8204afe15af161f568c7
SHA51273913ebf9895625de2b4a4e5c4534164f79b708bfc1338aade1d90aae57836bd7ea79e2a32976b138d8d5ab1d877ec5997428461acb588e732ec49ab8235d116
-
C:\Users\Admin\AppData\Local\Temp\test.test.dllMD5
83aa0f585f885db7ea32b8b38060df9f
SHA1180bde533d03dbcad86dd4a7cade5cebc7df7d7d
SHA256266faa5fab81575b32be38012258449bfea523b04ce9b29353953fb4b6dd74de
SHA5120018a52019b082ee75128158f30860a2cdcf0e422cc6a2ad119ae8667d454be30fda86a9f047f30cb411699d57b2a8ea3b10bbf6b6e346c986dc2468024608bf
-
\Users\Admin\AppData\Local\Temp\test.test.dllMD5
ed3b43ef66f58f891cc51cacc79b0b72
SHA102cfa19d275c96fafad6b3e440b220200b839f99
SHA2569c5c2af628233f118a88fb03f859e0f92f4393c8dd7c8204afe15af161f568c7
SHA51273913ebf9895625de2b4a4e5c4534164f79b708bfc1338aade1d90aae57836bd7ea79e2a32976b138d8d5ab1d877ec5997428461acb588e732ec49ab8235d116
-
\Users\Admin\AppData\Local\Temp\test.test.dllMD5
83aa0f585f885db7ea32b8b38060df9f
SHA1180bde533d03dbcad86dd4a7cade5cebc7df7d7d
SHA256266faa5fab81575b32be38012258449bfea523b04ce9b29353953fb4b6dd74de
SHA5120018a52019b082ee75128158f30860a2cdcf0e422cc6a2ad119ae8667d454be30fda86a9f047f30cb411699d57b2a8ea3b10bbf6b6e346c986dc2468024608bf
-
memory/1368-129-0x0000000000000000-mapping.dmp
-
memory/2504-122-0x00000000004E0000-0x0000000000501000-memory.dmpFilesize
132KB
-
memory/2504-118-0x0000000000000000-mapping.dmp
-
memory/2560-128-0x0000000000000000-mapping.dmp
-
memory/2756-119-0x0000000000000000-mapping.dmp
-
memory/2844-115-0x0000000000000000-mapping.dmp
-
memory/2844-116-0x0000000004D20000-0x0000000004DAE000-memory.dmpFilesize
568KB
-
memory/2844-117-0x0000000010000000-0x0000000010055000-memory.dmpFilesize
340KB
-
memory/3048-134-0x0000000000000000-mapping.dmp
-
memory/3576-124-0x0000000000000000-mapping.dmp
-
memory/3576-126-0x0000000003430000-0x0000000003473000-memory.dmpFilesize
268KB
-
memory/3668-127-0x0000000000000000-mapping.dmp
-
memory/3668-132-0x0000000002F30000-0x0000000002F51000-memory.dmpFilesize
132KB