Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
07-12-2021 22:56
Static task
static1
Behavioral task
behavioral1
Sample
9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe
Resource
win10-en-20211104
General
-
Target
9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe
-
Size
555KB
-
MD5
8c010d565f0ae6ae084bdeb35fba7ff1
-
SHA1
95485abfab63edbd848f3f3ec2821f50aba0b74d
-
SHA256
9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d
-
SHA512
73fa980b534c6ad3af0752b5eb775652d5cada3ed66fabdeceec74d6cfe9de01db9f7f7788612d77c9ad3270ed3c8b6c16131ccffe0207b8b7f8714d0f725215
Malware Config
Signatures
-
BitRAT Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1844-131-0x0000000000400000-0x00000000007CE000-memory.dmp family_bitrat behavioral1/memory/1844-132-0x000000000068A488-mapping.dmp family_bitrat behavioral1/memory/1844-139-0x0000000000400000-0x00000000007CE000-memory.dmp family_bitrat behavioral1/memory/1844-144-0x0000000000400000-0x00000000007CE000-memory.dmp family_bitrat -
Downloads MZ/PE file
-
Modifies Installed Components in the registry 2 TTPs
-
Drops startup file 1 IoCs
Processes:
9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vlc\chome_exe.exe 9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
powershell.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\HWMonitor = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\vlc\\chome_exe.exe" powershell.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
explorer.exedescription ioc process File opened (read-only) \??\D: explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
RegAsm.exepid process 1844 RegAsm.exe 1844 RegAsm.exe 1844 RegAsm.exe 1844 RegAsm.exe 1844 RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exedescription pid process target process PID 2120 set thread context of 1844 2120 9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe RegAsm.exe -
Drops file in Windows directory 5 IoCs
Processes:
explorer.exeSearchUI.exeShellExperienceHost.exedescription ioc process File created C:\Windows\rescache\_merged\2717123927\1713683155.pri explorer.exe File created C:\Windows\rescache\_merged\1601268389\3068621934.pri SearchUI.exe File created C:\Windows\rescache\_merged\4183903823\1195458082.pri ShellExperienceHost.exe File created C:\Windows\rescache\_merged\4032412167\2690874625.pri ShellExperienceHost.exe File created C:\Windows\rescache\_merged\4032412167\2690874625.pri explorer.exe -
Checks SCSI registry key(s) 3 TTPs 10 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 explorer.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
SearchUI.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchUI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchUI.exe -
Modifies registry class 30 IoCs
Processes:
explorer.exeSearchUI.exefirefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance explorer.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.cortana SearchUI.exe Set value (data) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.cortana SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "23" SearchUI.exe Set value (data) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "56" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "132805259250849572" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance explorer.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance explorer.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "56" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "23" SearchUI.exe Set value (data) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 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 explorer.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exepowershell.exepid process 2120 9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe 2120 9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe 3576 powershell.exe 3576 powershell.exe 3576 powershell.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exepowershell.exeRegAsm.exeexplorer.exedescription pid process Token: SeDebugPrivilege 2120 9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe Token: SeDebugPrivilege 3576 powershell.exe Token: SeShutdownPrivilege 1844 RegAsm.exe Token: SeShutdownPrivilege 2832 explorer.exe Token: SeCreatePagefilePrivilege 2832 explorer.exe Token: SeShutdownPrivilege 2832 explorer.exe Token: SeCreatePagefilePrivilege 2832 explorer.exe Token: SeShutdownPrivilege 2832 explorer.exe Token: SeCreatePagefilePrivilege 2832 explorer.exe Token: SeShutdownPrivilege 2832 explorer.exe Token: SeCreatePagefilePrivilege 2832 explorer.exe Token: SeShutdownPrivilege 2832 explorer.exe Token: SeCreatePagefilePrivilege 2832 explorer.exe Token: SeShutdownPrivilege 2832 explorer.exe Token: SeCreatePagefilePrivilege 2832 explorer.exe Token: SeShutdownPrivilege 2832 explorer.exe Token: SeCreatePagefilePrivilege 2832 explorer.exe Token: SeShutdownPrivilege 2832 explorer.exe Token: SeCreatePagefilePrivilege 2832 explorer.exe Token: SeShutdownPrivilege 2832 explorer.exe Token: SeCreatePagefilePrivilege 2832 explorer.exe Token: SeShutdownPrivilege 2832 explorer.exe Token: SeCreatePagefilePrivilege 2832 explorer.exe Token: SeShutdownPrivilege 2832 explorer.exe Token: SeCreatePagefilePrivilege 2832 explorer.exe Token: SeShutdownPrivilege 2832 explorer.exe Token: SeCreatePagefilePrivilege 2832 explorer.exe Token: SeShutdownPrivilege 2832 explorer.exe Token: SeCreatePagefilePrivilege 2832 explorer.exe Token: SeShutdownPrivilege 2832 explorer.exe Token: SeCreatePagefilePrivilege 2832 explorer.exe Token: SeShutdownPrivilege 2832 explorer.exe Token: SeCreatePagefilePrivilege 2832 explorer.exe Token: SeShutdownPrivilege 2832 explorer.exe Token: SeCreatePagefilePrivilege 2832 explorer.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
Processes:
explorer.exeRegAsm.exepid process 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 1844 RegAsm.exe 1844 RegAsm.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe -
Suspicious use of SendNotifyMessage 21 IoCs
Processes:
explorer.exeRegAsm.exepid process 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 1844 RegAsm.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
RegAsm.exeSearchUI.exeShellExperienceHost.exepid process 1844 RegAsm.exe 1844 RegAsm.exe 3300 SearchUI.exe 3220 ShellExperienceHost.exe 3220 ShellExperienceHost.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exeRegAsm.exeexplorer.exefirefox.exedescription pid process target process PID 2120 wrote to memory of 3576 2120 9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe powershell.exe PID 2120 wrote to memory of 3576 2120 9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe powershell.exe PID 2120 wrote to memory of 2748 2120 9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe RegAsm.exe PID 2120 wrote to memory of 2748 2120 9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe RegAsm.exe PID 2120 wrote to memory of 2748 2120 9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe RegAsm.exe PID 2120 wrote to memory of 1844 2120 9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe RegAsm.exe PID 2120 wrote to memory of 1844 2120 9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe RegAsm.exe PID 2120 wrote to memory of 1844 2120 9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe RegAsm.exe PID 2120 wrote to memory of 1844 2120 9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe RegAsm.exe PID 2120 wrote to memory of 1844 2120 9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe RegAsm.exe PID 2120 wrote to memory of 1844 2120 9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe RegAsm.exe PID 2120 wrote to memory of 1844 2120 9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe RegAsm.exe PID 2120 wrote to memory of 1844 2120 9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe RegAsm.exe PID 2120 wrote to memory of 1844 2120 9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe RegAsm.exe PID 2120 wrote to memory of 1844 2120 9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe RegAsm.exe PID 2120 wrote to memory of 1844 2120 9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe RegAsm.exe PID 1844 wrote to memory of 2832 1844 RegAsm.exe explorer.exe PID 1844 wrote to memory of 2832 1844 RegAsm.exe explorer.exe PID 2832 wrote to memory of 2244 2832 explorer.exe ctfmon.exe PID 2832 wrote to memory of 2244 2832 explorer.exe ctfmon.exe PID 2832 wrote to memory of 3828 2832 explorer.exe firefox.exe PID 2832 wrote to memory of 3828 2832 explorer.exe firefox.exe PID 3828 wrote to memory of 1532 3828 firefox.exe firefox.exe PID 3828 wrote to memory of 1532 3828 firefox.exe firefox.exe PID 3828 wrote to memory of 1532 3828 firefox.exe firefox.exe PID 3828 wrote to memory of 1532 3828 firefox.exe firefox.exe PID 3828 wrote to memory of 1532 3828 firefox.exe firefox.exe PID 3828 wrote to memory of 1532 3828 firefox.exe firefox.exe PID 3828 wrote to memory of 1532 3828 firefox.exe firefox.exe PID 3828 wrote to memory of 1532 3828 firefox.exe firefox.exe PID 3828 wrote to memory of 1532 3828 firefox.exe firefox.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe"C:\Users\Admin\AppData\Local\Temp\9b7a42def14129b70c89d87853845f8c21fe04c6787757d3e59d6bd1ee21234d.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'HWMonitor';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'HWMonitor' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vlc\chome_exe.exe"' -PropertyType 'String'2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Enumerates connected drives
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\ctfmon.exectfmon.exe4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"5⤵
- Checks processor information in registry
- Modifies registry class
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1532.0.1758640288\1090524860" -parentBuildID 20200403170909 -prefsHandle 1524 -prefMapHandle 1516 -prefsLen 1 -prefMapSize 219680 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1532 "\\.\pipe\gecko-crash-server-pipe.1532" 1604 gpu6⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1532.3.889132190\1911702480" -childID 1 -isForBrowser -prefsHandle 2088 -prefMapHandle 2224 -prefsLen 156 -prefMapSize 219680 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1532 "\\.\pipe\gecko-crash-server-pipe.1532" 2104 tab6⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1532.13.1242781933\1598691934" -childID 2 -isForBrowser -prefsHandle 3416 -prefMapHandle 3412 -prefsLen 7013 -prefMapSize 219680 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1532 "\\.\pipe\gecko-crash-server-pipe.1532" 3376 tab6⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1532.20.2100178003\1695601037" -childID 3 -isForBrowser -prefsHandle 4596 -prefMapHandle 4576 -prefsLen 7718 -prefMapSize 219680 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1532 "\\.\pipe\gecko-crash-server-pipe.1532" 4556 tab6⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1844-139-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1844-132-0x000000000068A488-mapping.dmp
-
memory/1844-131-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1844-144-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/2120-125-0x0000000002810000-0x0000000002811000-memory.dmpFilesize
4KB
-
memory/2120-124-0x000000001C100000-0x000000001C4C6000-memory.dmpFilesize
3.8MB
-
memory/2120-123-0x000000001BF80000-0x000000001BF81000-memory.dmpFilesize
4KB
-
memory/2120-118-0x0000000000580000-0x0000000000581000-memory.dmpFilesize
4KB
-
memory/2120-122-0x000000001BAA0000-0x000000001BE68000-memory.dmpFilesize
3.8MB
-
memory/2120-121-0x0000000000E30000-0x0000000000E32000-memory.dmpFilesize
8KB
-
memory/2120-120-0x0000000000D00000-0x0000000000D0D000-memory.dmpFilesize
52KB
-
memory/2244-151-0x0000000000000000-mapping.dmp
-
memory/2832-152-0x0000000003160000-0x0000000003161000-memory.dmpFilesize
4KB
-
memory/2832-150-0x0000000000000000-mapping.dmp
-
memory/3576-126-0x0000000000000000-mapping.dmp
-
memory/3576-134-0x00000276F0BD0000-0x00000276F0BD2000-memory.dmpFilesize
8KB
-
memory/3576-135-0x00000276F0BD3000-0x00000276F0BD5000-memory.dmpFilesize
8KB
-
memory/3576-136-0x00000276F0AE0000-0x00000276F0AE2000-memory.dmpFilesize
8KB
-
memory/3576-137-0x00000276F0AE0000-0x00000276F0AE2000-memory.dmpFilesize
8KB
-
memory/3576-133-0x00000276F2A00000-0x00000276F2A01000-memory.dmpFilesize
4KB
-
memory/3576-140-0x00000276F0AE0000-0x00000276F0AE2000-memory.dmpFilesize
8KB
-
memory/3576-130-0x00000276F0AE0000-0x00000276F0AE2000-memory.dmpFilesize
8KB
-
memory/3576-147-0x00000276F0AE0000-0x00000276F0AE2000-memory.dmpFilesize
8KB
-
memory/3576-148-0x00000276F0BD6000-0x00000276F0BD8000-memory.dmpFilesize
8KB
-
memory/3576-149-0x00000276F0BD8000-0x00000276F0BD9000-memory.dmpFilesize
4KB
-
memory/3576-129-0x00000276F0AE0000-0x00000276F0AE2000-memory.dmpFilesize
8KB
-
memory/3576-128-0x00000276F0AE0000-0x00000276F0AE2000-memory.dmpFilesize
8KB
-
memory/3576-127-0x00000276F0AE0000-0x00000276F0AE2000-memory.dmpFilesize
8KB