Overview
overview
10Static
static
029b714502...39.dll
windows11_x64
10061dfb6a25...52.dll
windows11_x64
1006d55f75d7...d2.dll
windows11_x64
1024401ac43b...65.dll
windows11_x64
8260e2d5769...40.dll
windows11_x64
1026cd036960...18.dll
windows11_x64
102a0a88a2e5...4a.dll
windows11_x64
102f33217d51...94.dll
windows11_x64
10336cdd146b...da.dll
windows11_x64
10417c1828d9...73.dll
windows11_x64
104d3095c796...ee.dll
windows11_x64
1054e526fe05...4c.dll
windows11_x64
106402b33d72...3b.dll
windows11_x64
1064c044cb3e...db.dll
windows11_x64
10671f477c30...4e.dll
windows11_x64
1067785724b6...ce.dll
windows11_x64
106c6934613a...fb.dll
windows11_x64
106f63742c25...fd.dll
windows11_x64
10813a9b03c6...48.dll
windows11_x64
10839ac59a78...e3.dll
windows11_x64
1085d0b72fe8...39.dll
windows11_x64
10a34cb4049e...c4.dll
windows11_x64
1a55c19c552...60.dll
windows11_x64
1a98e988f03...48.dll
windows11_x64
10acc31f97c3...27.dll
windows11_x64
10b194eec1e5...c7.dll
windows11_x64
10bac73f9cce...00.dll
windows11_x64
10c5d2f0da18...0c.dll
windows11_x64
10d559ee0a26...7e.dll
windows11_x64
8db5276c0d5...79.dll
windows11_x64
10e5efde9740...15.dll
windows11_x64
10fe028e6f99...1c.dll
windows11_x64
10Resubmissions
01-11-2021 12:31
211101-pp5r3ahha4 1031-10-2021 09:03
211031-k1bwxacfaq 1014-10-2021 01:44
211014-b6aflafeg4 10Analysis
-
max time kernel
207s -
max time network
368s -
platform
windows11_x64 -
resource
win11 -
submitted
01-11-2021 12:31
Static task
static1
Behavioral task
behavioral1
Sample
029b714502283599a5efb86d41c48fd46751ab727b707bde620e517ec3aa3c39.dll
Resource
win11
Behavioral task
behavioral2
Sample
061dfb6a251e536f700a295239652dafab34aee5e5145320d1d57e3fca5e5d52.dll
Resource
win11
Behavioral task
behavioral3
Sample
06d55f75d7c76d6924c0b8439fa3cda28b89284204a6db982e4baf3a37fb35d2.dll
Resource
win11
Behavioral task
behavioral4
Sample
24401ac43b6dbb7048cb27425b4f0f76a9b20b6b4fffa33ff8091c3c11ef8365.dll
Resource
win11
Behavioral task
behavioral5
Sample
260e2d5769f0a50a7b49d4c43059221eb7acc4b9fc460763e0cfcd793f2a6840.dll
Resource
win11
Behavioral task
behavioral6
Sample
26cd03696045fb93b415b022fa6bc832098394bf362f4b4c4e897e9550d12618.dll
Resource
win11
Behavioral task
behavioral7
Sample
2a0a88a2e5f9cafa10a48d63bdfcdf965b72c25978ab46cf28e795dbedc9624a.dll
Resource
win11
Behavioral task
behavioral8
Sample
2f33217d51117cf3d6c6ed3ab50724964367fc7a85e1bb1dc87d241b8d953894.dll
Resource
win11
Behavioral task
behavioral9
Sample
336cdd146beca939c6d1e3e3c00cc10ec2d6e859a18d350bff937ad5194c27da.dll
Resource
win11
Behavioral task
behavioral10
Sample
417c1828d98ba4f05f7a2edb71a9105f0aebf3d554393970b96e59d4db7b4473.dll
Resource
win11
Behavioral task
behavioral11
Sample
4d3095c7965c7bdd32b81b72c95f767134915cf08ebe1237721ed5208de4beee.dll
Resource
win11
Behavioral task
behavioral12
Sample
54e526fe059a3f25cdaed954e32f44eadffb3e51548658409468dcf2d63b634c.dll
Resource
win11
Behavioral task
behavioral13
Sample
6402b33d729c8bb44881747a8f397f4aec408bf5e18b9af6fd86cdfa3f96323b.dll
Resource
win11
Behavioral task
behavioral14
Sample
64c044cb3ec26babdd17107b2aa6ded60b22473c4e2943e1fcc03df8bc2e0edb.dll
Resource
win11
Behavioral task
behavioral15
Sample
671f477c3039786c5f3553760377be03b91bfb66f31ba9370ed2193192cf5b4e.dll
Resource
win11
Behavioral task
behavioral16
Sample
67785724b67ecd79b7cd4c64a249794b9abda8b680fe52a0ce85bb83ddfb6cce.dll
Resource
win11
Behavioral task
behavioral17
Sample
6c6934613abde41f82043bb7c269a1e614920a83a2b90eaf325ca7b998183efb.dll
Resource
win11
Behavioral task
behavioral18
Sample
6f63742c25fd3a2dae5995f182254c253003066488ef86e754f661e8ba1d76fd.dll
Resource
win11
Behavioral task
behavioral19
Sample
813a9b03c6c1caec4eca8a867dcfbda7860bca6a5d481acb4c131c1a868d4b48.dll
Resource
win11
Behavioral task
behavioral20
Sample
839ac59a78a0f2c446edb3cccbaf0bc5781605a1f848878f9e96cd5e0e425fe3.dll
Resource
win11
Behavioral task
behavioral21
Sample
85d0b72fe822fd6c22827b4da1917d2c1f2d9faa838e003e78e533384ea80939.dll
Resource
win11
Behavioral task
behavioral22
Sample
a34cb4049eb43d455d8619607cc6e1a8c380e9d8507306e9c5bc17eaed6459c4.dll
Resource
win11
Behavioral task
behavioral23
Sample
a55c19c552f579041ad7289aceeb400da215fe29aedbf0c14e8a66be1bee8360.dll
Resource
win11
Behavioral task
behavioral24
Sample
a98e988f03fd5be37c66878017a3dcd741adf75bf1df1ed6dde2c15ee213bb48.dll
Resource
win11
Behavioral task
behavioral25
Sample
acc31f97c3124a317f2939944777e103311f4b0c51788d2e562c24a08e2afe27.dll
Resource
win11
Behavioral task
behavioral26
Sample
b194eec1e599feeadfd463b06727e8b3c73a72a4c20017e5cfaf89fbf6d365c7.dll
Resource
win11
Behavioral task
behavioral27
Sample
bac73f9ccebf93009a6037145a9c71a2e8b916956f6a7e6a4f4b53b4b50b7a00.dll
Resource
win11
Behavioral task
behavioral28
Sample
c5d2f0da18fb33a25b53fd8b9b98f0bfa95458e3c0feb687852f469167a0110c.dll
Resource
win11
Behavioral task
behavioral29
Sample
d559ee0a26fa500cd57fac25d58ba4319a794f329c8711e89afac3c281f9dd7e.dll
Resource
win11
Behavioral task
behavioral30
Sample
db5276c0d5ecd3b338a98983001a5b8cbbf5b488bf420d8cc0267801b963f479.dll
Resource
win11
Behavioral task
behavioral31
Sample
e5efde974017a12a573548f12b5473887601c897e8660eb57803c18523f72815.dll
Resource
win11
Behavioral task
behavioral32
Sample
fe028e6f99a02a016643a2db14534fa977a78f45b36ff9db5b60e7e709f5541c.dll
Resource
win11
General
-
Target
4d3095c7965c7bdd32b81b72c95f767134915cf08ebe1237721ed5208de4beee.dll
-
Size
488KB
-
MD5
7f0b9d11c95a65e9e9f87b2341bb01ad
-
SHA1
93abbf5758c39672d69502690b5e4003a47f9e72
-
SHA256
4d3095c7965c7bdd32b81b72c95f767134915cf08ebe1237721ed5208de4beee
-
SHA512
eb81b291a55ab91dfaef4a64661b2325c594890ebbcb71b00d5029275c1b7ec43880d85737fceba3c0de1cd20ed94ffa7a9112424c3ef25fd0e21e586a329648
Malware Config
Extracted
qakbot
402.318
obama101
1632228858
47.22.148.6:443
24.55.112.61:443
140.82.49.12:443
24.139.72.117:443
136.232.34.70:443
24.229.150.54:995
71.74.12.34:443
73.151.236.31:443
120.150.218.241:995
105.198.236.99:443
76.25.142.196:443
45.46.53.140:2222
144.139.47.206:443
96.37.113.36:993
173.21.10.71:2222
67.165.206.193:993
189.210.115.207:443
109.12.111.14:443
68.204.7.158:443
95.77.223.148:443
75.188.35.168:443
216.201.162.158:443
196.218.227.241:995
185.250.148.74:2222
81.214.126.173:2222
68.186.192.69:443
72.252.201.69:443
92.59.35.196:2222
24.152.219.253:995
50.29.166.232:995
75.67.192.125:443
24.95.61.62:443
73.25.124.140:2222
27.223.92.142:995
64.121.114.87:443
151.205.102.42:443
72.240.200.181:2222
75.137.47.174:443
45.32.211.207:995
45.32.211.207:8443
149.28.98.196:2222
149.28.98.196:995
207.246.77.75:8443
45.63.107.192:995
149.28.99.97:443
45.77.117.108:2222
149.28.99.97:2222
45.32.211.207:2222
45.63.107.192:443
149.28.101.90:443
149.28.101.90:8443
149.28.99.97:995
96.253.46.210:443
83.196.56.65:2222
45.77.115.208:2222
45.77.115.208:8443
45.77.115.208:443
144.202.38.185:443
144.202.38.185:2222
45.32.211.207:443
144.202.38.185:995
149.28.98.196:443
149.28.101.90:2222
45.77.117.108:443
207.246.77.75:995
207.246.77.75:443
207.246.77.75:2222
149.28.101.90:995
45.77.117.108:995
45.77.117.108:8443
45.77.115.208:995
71.163.222.223:443
90.87.245.154:2222
207.246.116.237:995
207.246.116.237:443
45.63.107.192:2222
207.246.116.237:8443
207.246.116.237:2222
24.179.77.236:443
184.185.103.157:443
217.165.164.110:2222
213.122.113.120:443
193.248.221.184:2222
188.27.179.172:443
222.153.169.147:995
100.2.20.137:443
172.78.42.79:443
97.69.160.4:2222
105.198.236.101:443
98.192.185.86:443
186.144.33.73:443
96.61.23.88:995
86.220.60.247:2222
71.41.184.10:3389
175.143.92.16:443
46.149.81.250:443
98.252.118.134:443
92.96.3.180:2078
71.187.170.235:443
50.244.112.106:443
24.122.118.18:443
47.196.213.73:443
186.154.175.13:443
70.163.161.79:443
78.63.226.32:443
76.168.147.166:993
77.27.207.217:995
31.4.242.28:995
125.62.192.195:443
195.12.154.8:443
96.21.251.127:2222
71.199.192.62:443
70.168.130.172:995
82.12.157.95:995
209.210.187.52:995
209.210.187.52:443
67.6.12.4:443
189.222.59.177:443
174.104.22.30:443
142.117.191.18:2222
189.146.183.105:443
213.60.147.140:443
196.221.207.137:995
108.46.145.30:443
187.250.238.164:995
2.7.116.188:2222
195.43.173.70:443
106.250.150.98:443
45.67.231.247:443
83.110.103.152:443
83.110.9.71:2222
78.97.207.104:443
59.90.246.200:443
80.227.5.69:443
125.63.101.62:443
86.236.77.68:2222
109.106.69.138:2222
84.72.35.226:443
217.133.54.140:32100
197.161.154.132:443
89.137.211.239:995
74.222.204.82:995
122.148.156.131:995
156.223.110.23:443
144.139.166.18:443
202.185.166.181:443
76.94.200.148:995
71.63.120.101:443
196.151.252.84:443
202.188.138.162:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 5076 created 4188 5076 WerFault.exe 79 -
Sets service image path in registry 2 TTPs
-
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1628 4188 WerFault.exe 79 -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4188 rundll32.exe 4188 rundll32.exe 1628 WerFault.exe 1628 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2480 svchost.exe Token: SeCreatePagefilePrivilege 2480 svchost.exe Token: SeShutdownPrivilege 2480 svchost.exe Token: SeCreatePagefilePrivilege 2480 svchost.exe Token: SeShutdownPrivilege 2480 svchost.exe Token: SeCreatePagefilePrivilege 2480 svchost.exe Token: SeRestorePrivilege 1628 WerFault.exe Token: SeBackupPrivilege 1628 WerFault.exe Token: SeShutdownPrivilege 1584 svchost.exe Token: SeCreatePagefilePrivilege 1584 svchost.exe Token: SeSecurityPrivilege 3984 TiWorker.exe Token: SeRestorePrivilege 3984 TiWorker.exe Token: SeBackupPrivilege 3984 TiWorker.exe Token: SeBackupPrivilege 3984 TiWorker.exe Token: SeRestorePrivilege 3984 TiWorker.exe Token: SeSecurityPrivilege 3984 TiWorker.exe Token: SeBackupPrivilege 3984 TiWorker.exe Token: SeRestorePrivilege 3984 TiWorker.exe Token: SeSecurityPrivilege 3984 TiWorker.exe Token: SeBackupPrivilege 3984 TiWorker.exe Token: SeRestorePrivilege 3984 TiWorker.exe Token: SeSecurityPrivilege 3984 TiWorker.exe Token: SeBackupPrivilege 3984 TiWorker.exe Token: SeRestorePrivilege 3984 TiWorker.exe Token: SeSecurityPrivilege 3984 TiWorker.exe Token: SeBackupPrivilege 3984 TiWorker.exe Token: SeRestorePrivilege 3984 TiWorker.exe Token: SeSecurityPrivilege 3984 TiWorker.exe Token: SeBackupPrivilege 3984 TiWorker.exe Token: SeRestorePrivilege 3984 TiWorker.exe Token: SeSecurityPrivilege 3984 TiWorker.exe Token: SeBackupPrivilege 3984 TiWorker.exe Token: SeRestorePrivilege 3984 TiWorker.exe Token: SeSecurityPrivilege 3984 TiWorker.exe Token: SeBackupPrivilege 3984 TiWorker.exe Token: SeRestorePrivilege 3984 TiWorker.exe Token: SeSecurityPrivilege 3984 TiWorker.exe Token: SeBackupPrivilege 3984 TiWorker.exe Token: SeRestorePrivilege 3984 TiWorker.exe Token: SeSecurityPrivilege 3984 TiWorker.exe Token: SeBackupPrivilege 3984 TiWorker.exe Token: SeRestorePrivilege 3984 TiWorker.exe Token: SeSecurityPrivilege 3984 TiWorker.exe Token: SeBackupPrivilege 3984 TiWorker.exe Token: SeRestorePrivilege 3984 TiWorker.exe Token: SeSecurityPrivilege 3984 TiWorker.exe Token: SeBackupPrivilege 3984 TiWorker.exe Token: SeRestorePrivilege 3984 TiWorker.exe Token: SeSecurityPrivilege 3984 TiWorker.exe Token: SeBackupPrivilege 3984 TiWorker.exe Token: SeRestorePrivilege 3984 TiWorker.exe Token: SeSecurityPrivilege 3984 TiWorker.exe Token: SeBackupPrivilege 3984 TiWorker.exe Token: SeRestorePrivilege 3984 TiWorker.exe Token: SeSecurityPrivilege 3984 TiWorker.exe Token: SeBackupPrivilege 3984 TiWorker.exe Token: SeRestorePrivilege 3984 TiWorker.exe Token: SeSecurityPrivilege 3984 TiWorker.exe Token: SeBackupPrivilege 3984 TiWorker.exe Token: SeRestorePrivilege 3984 TiWorker.exe Token: SeSecurityPrivilege 3984 TiWorker.exe Token: SeBackupPrivilege 3984 TiWorker.exe Token: SeRestorePrivilege 3984 TiWorker.exe Token: SeSecurityPrivilege 3984 TiWorker.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3976 wrote to memory of 4188 3976 rundll32.exe 79 PID 3976 wrote to memory of 4188 3976 rundll32.exe 79 PID 3976 wrote to memory of 4188 3976 rundll32.exe 79 PID 5076 wrote to memory of 4188 5076 WerFault.exe 79 PID 5076 wrote to memory of 4188 5076 WerFault.exe 79 PID 1584 wrote to memory of 1988 1584 svchost.exe 88 PID 1584 wrote to memory of 1988 1584 svchost.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4d3095c7965c7bdd32b81b72c95f767134915cf08ebe1237721ed5208de4beee.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4d3095c7965c7bdd32b81b72c95f767134915cf08ebe1237721ed5208de4beee.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:4188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 5443⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe a1dc3acf1501c0a1ea4c047be2fe9c70 dza1Abbtv0Spb7lhPljHsQ.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
PID:1800
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4188 -ip 41881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:5076
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\uus\AMD64\MoUsoCoreWorker.exeC:\Windows\uus\AMD64\MoUsoCoreWorker.exe2⤵PID:1988
-
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.22000.100_none_04da31ff4c67c24a\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.22000.100_none_04da31ff4c67c24a\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe a1dc3acf1501c0a1ea4c047be2fe9c70 dza1Abbtv0Spb7lhPljHsQ.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
PID:4300
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe a1dc3acf1501c0a1ea4c047be2fe9c70 dza1Abbtv0Spb7lhPljHsQ.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
PID:4240