Analysis
-
max time kernel
165s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
05-02-2022 15:49
Static task
static1
Behavioral task
behavioral1
Sample
a00b8f8bc69f5c71136f4f4dc60e6ac0.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
a00b8f8bc69f5c71136f4f4dc60e6ac0.exe
Resource
win10v2004-en-20220112
General
-
Target
a00b8f8bc69f5c71136f4f4dc60e6ac0.exe
-
Size
3.3MB
-
MD5
a00b8f8bc69f5c71136f4f4dc60e6ac0
-
SHA1
8be1e7ea88fff28314d0d52ded564bdca8654ce4
-
SHA256
427abc2035bd94beb2512e021757f81b9fbac201eb72018296889a8509e56072
-
SHA512
edb33962b03120a6aada572723a4fcc8ae16968f516c91587f0a243e00816360187dc791a25f23aa69afb96b25381a68bd96558e8305ff10fb6de98957f66ed0
Malware Config
Signatures
-
Process spawned unexpected child process 11 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 560 2788 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3344 2788 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8 2788 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4076 2788 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3872 2788 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3184 2788 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1948 2788 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2168 2788 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2588 2788 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3000 2788 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3964 2788 schtasks.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
StartMenuExperienceHost.exepid process 4072 StartMenuExperienceHost.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
StartMenuExperienceHost.exea00b8f8bc69f5c71136f4f4dc60e6ac0.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion StartMenuExperienceHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion StartMenuExperienceHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a00b8f8bc69f5c71136f4f4dc60e6ac0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a00b8f8bc69f5c71136f4f4dc60e6ac0.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a00b8f8bc69f5c71136f4f4dc60e6ac0.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation a00b8f8bc69f5c71136f4f4dc60e6ac0.exe -
Processes:
resource yara_rule behavioral2/memory/2852-132-0x00000000008F0000-0x00000000011C6000-memory.dmp themida behavioral2/memory/2852-133-0x00000000008F0000-0x00000000011C6000-memory.dmp themida C:\Program Files (x86)\Windows Multimedia Platform\StartMenuExperienceHost.exe themida C:\Program Files (x86)\Windows Multimedia Platform\StartMenuExperienceHost.exe themida behavioral2/memory/4072-142-0x0000000000F80000-0x0000000001856000-memory.dmp themida behavioral2/memory/4072-143-0x0000000000F80000-0x0000000001856000-memory.dmp themida -
Adds Run key to start application 2 TTPs 11 IoCs
Processes:
a00b8f8bc69f5c71136f4f4dc60e6ac0.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Program Files\\Common Files\\microsoft shared\\ClickToRun\\ClientCapabilities\\OfficeClickToRun.exe\"" a00b8f8bc69f5c71136f4f4dc60e6ac0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Windows\\System32\\KBDLT\\SppExtComObj.exe\"" a00b8f8bc69f5c71136f4f4dc60e6ac0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\odt\\services.exe\"" a00b8f8bc69f5c71136f4f4dc60e6ac0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Program Files (x86)\\Windows Multimedia Platform\\StartMenuExperienceHost.exe\"" a00b8f8bc69f5c71136f4f4dc60e6ac0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Windows\\DtcInstall\\explorer.exe\"" a00b8f8bc69f5c71136f4f4dc60e6ac0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Recovery\\WindowsRE\\csrss.exe\"" a00b8f8bc69f5c71136f4f4dc60e6ac0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Windows\\System32\\fms\\fontdrvhost.exe\"" a00b8f8bc69f5c71136f4f4dc60e6ac0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Windows\\SystemApps\\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\\AppxManifest\\StartMenuExperienceHost.exe\"" a00b8f8bc69f5c71136f4f4dc60e6ac0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\System32\\playtomenu\\dwm.exe\"" a00b8f8bc69f5c71136f4f4dc60e6ac0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Windows\\System32\\WpPortingLibrary\\lsass.exe\"" a00b8f8bc69f5c71136f4f4dc60e6ac0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Windows\\HelpPane\\explorer.exe\"" a00b8f8bc69f5c71136f4f4dc60e6ac0.exe -
Processes:
a00b8f8bc69f5c71136f4f4dc60e6ac0.exeStartMenuExperienceHost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a00b8f8bc69f5c71136f4f4dc60e6ac0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA StartMenuExperienceHost.exe -
Drops file in System32 directory 8 IoCs
Processes:
a00b8f8bc69f5c71136f4f4dc60e6ac0.exedescription ioc process File created C:\Windows\SysWOW64\WpPortingLibrary\6203df4a6bafc7c328ee7f6f8ca0a8a838a8a1b9 a00b8f8bc69f5c71136f4f4dc60e6ac0.exe File opened for modification C:\Windows\SysWOW64\fms\fontdrvhost.exe a00b8f8bc69f5c71136f4f4dc60e6ac0.exe File created C:\Windows\SysWOW64\fms\5b884080fd4f94e2695da25c503f9e33b9605b83 a00b8f8bc69f5c71136f4f4dc60e6ac0.exe File opened for modification C:\Windows\SysWOW64\playtomenu\dwm.exe a00b8f8bc69f5c71136f4f4dc60e6ac0.exe File created C:\Windows\SysWOW64\playtomenu\6cb0b6c459d5d3455a3da700e713f2e2529862ff a00b8f8bc69f5c71136f4f4dc60e6ac0.exe File opened for modification C:\Windows\SysWOW64\KBDLT\SppExtComObj.exe a00b8f8bc69f5c71136f4f4dc60e6ac0.exe File created C:\Windows\SysWOW64\KBDLT\e1ef82546f0b02b7e974f28047f3788b1128cce1 a00b8f8bc69f5c71136f4f4dc60e6ac0.exe File opened for modification C:\Windows\SysWOW64\WpPortingLibrary\lsass.exe a00b8f8bc69f5c71136f4f4dc60e6ac0.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
a00b8f8bc69f5c71136f4f4dc60e6ac0.exeStartMenuExperienceHost.exepid process 2852 a00b8f8bc69f5c71136f4f4dc60e6ac0.exe 4072 StartMenuExperienceHost.exe -
Drops file in Program Files directory 4 IoCs
Processes:
a00b8f8bc69f5c71136f4f4dc60e6ac0.exedescription ioc process File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\StartMenuExperienceHost.exe a00b8f8bc69f5c71136f4f4dc60e6ac0.exe File created C:\Program Files (x86)\Windows Multimedia Platform\55b276f4edf653fe07efe8f1ecc32d3d195abd16 a00b8f8bc69f5c71136f4f4dc60e6ac0.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientCapabilities\OfficeClickToRun.exe a00b8f8bc69f5c71136f4f4dc60e6ac0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientCapabilities\e6c9b481da804f07baff8eff543b0a1441069b5d a00b8f8bc69f5c71136f4f4dc60e6ac0.exe -
Drops file in Windows directory 7 IoCs
Processes:
a00b8f8bc69f5c71136f4f4dc60e6ac0.exesvchost.exedescription ioc process File opened for modification C:\Windows\HelpPane\explorer.exe a00b8f8bc69f5c71136f4f4dc60e6ac0.exe File created C:\Windows\HelpPane\7a0fd90576e08807bde2cc57bcf9854bbce05fe3 a00b8f8bc69f5c71136f4f4dc60e6ac0.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat svchost.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\AppxManifest\StartMenuExperienceHost.exe a00b8f8bc69f5c71136f4f4dc60e6ac0.exe File created C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\AppxManifest\55b276f4edf653fe07efe8f1ecc32d3d195abd16 a00b8f8bc69f5c71136f4f4dc60e6ac0.exe File opened for modification C:\Windows\DtcInstall\explorer.exe a00b8f8bc69f5c71136f4f4dc60e6ac0.exe File created C:\Windows\DtcInstall\7a0fd90576e08807bde2cc57bcf9854bbce05fe3 a00b8f8bc69f5c71136f4f4dc60e6ac0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MusNotifyIcon.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe -
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2168 schtasks.exe 2588 schtasks.exe 3964 schtasks.exe 560 schtasks.exe 3344 schtasks.exe 3872 schtasks.exe 3184 schtasks.exe 1948 schtasks.exe 8 schtasks.exe 4076 schtasks.exe 3000 schtasks.exe -
Modifies data under HKEY_USERS 47 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4104" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "4.597565" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132887261953770952" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.000000" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "3912" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe -
Modifies registry class 1 IoCs
Processes:
a00b8f8bc69f5c71136f4f4dc60e6ac0.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings a00b8f8bc69f5c71136f4f4dc60e6ac0.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
a00b8f8bc69f5c71136f4f4dc60e6ac0.exepid process 2852 a00b8f8bc69f5c71136f4f4dc60e6ac0.exe 2852 a00b8f8bc69f5c71136f4f4dc60e6ac0.exe 2852 a00b8f8bc69f5c71136f4f4dc60e6ac0.exe 2852 a00b8f8bc69f5c71136f4f4dc60e6ac0.exe 2852 a00b8f8bc69f5c71136f4f4dc60e6ac0.exe 2852 a00b8f8bc69f5c71136f4f4dc60e6ac0.exe 2852 a00b8f8bc69f5c71136f4f4dc60e6ac0.exe 2852 a00b8f8bc69f5c71136f4f4dc60e6ac0.exe 2852 a00b8f8bc69f5c71136f4f4dc60e6ac0.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a00b8f8bc69f5c71136f4f4dc60e6ac0.exeStartMenuExperienceHost.exedescription pid process Token: SeDebugPrivilege 2852 a00b8f8bc69f5c71136f4f4dc60e6ac0.exe Token: SeDebugPrivilege 4072 StartMenuExperienceHost.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
a00b8f8bc69f5c71136f4f4dc60e6ac0.execmd.exew32tm.exedescription pid process target process PID 2852 wrote to memory of 1572 2852 a00b8f8bc69f5c71136f4f4dc60e6ac0.exe cmd.exe PID 2852 wrote to memory of 1572 2852 a00b8f8bc69f5c71136f4f4dc60e6ac0.exe cmd.exe PID 2852 wrote to memory of 1572 2852 a00b8f8bc69f5c71136f4f4dc60e6ac0.exe cmd.exe PID 1572 wrote to memory of 3448 1572 cmd.exe w32tm.exe PID 1572 wrote to memory of 3448 1572 cmd.exe w32tm.exe PID 1572 wrote to memory of 3448 1572 cmd.exe w32tm.exe PID 3448 wrote to memory of 1380 3448 w32tm.exe w32tm.exe PID 3448 wrote to memory of 1380 3448 w32tm.exe w32tm.exe PID 1572 wrote to memory of 4072 1572 cmd.exe StartMenuExperienceHost.exe PID 1572 wrote to memory of 4072 1572 cmd.exe StartMenuExperienceHost.exe PID 1572 wrote to memory of 4072 1572 cmd.exe StartMenuExperienceHost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a00b8f8bc69f5c71136f4f4dc60e6ac0.exe"C:\Users\Admin\AppData\Local\Temp\a00b8f8bc69f5c71136f4f4dc60e6ac0.exe"1⤵
- Checks BIOS information in registry
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\deRodmE1iE.bat"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:24⤵
-
C:\Program Files (x86)\Windows Multimedia Platform\StartMenuExperienceHost.exe"C:\Program Files (x86)\Windows Multimedia Platform\StartMenuExperienceHost.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\odt\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\AppxManifest\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\DtcInstall\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\playtomenu\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientCapabilities\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\System32\KBDLT\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\System32\WpPortingLibrary\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\HelpPane\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\System32\fms\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Windows Multimedia Platform\StartMenuExperienceHost.exeMD5
a00b8f8bc69f5c71136f4f4dc60e6ac0
SHA18be1e7ea88fff28314d0d52ded564bdca8654ce4
SHA256427abc2035bd94beb2512e021757f81b9fbac201eb72018296889a8509e56072
SHA512edb33962b03120a6aada572723a4fcc8ae16968f516c91587f0a243e00816360187dc791a25f23aa69afb96b25381a68bd96558e8305ff10fb6de98957f66ed0
-
C:\Program Files (x86)\Windows Multimedia Platform\StartMenuExperienceHost.exeMD5
a00b8f8bc69f5c71136f4f4dc60e6ac0
SHA18be1e7ea88fff28314d0d52ded564bdca8654ce4
SHA256427abc2035bd94beb2512e021757f81b9fbac201eb72018296889a8509e56072
SHA512edb33962b03120a6aada572723a4fcc8ae16968f516c91587f0a243e00816360187dc791a25f23aa69afb96b25381a68bd96558e8305ff10fb6de98957f66ed0
-
C:\Users\Admin\AppData\Local\Temp\deRodmE1iE.batMD5
58e37eab81ee5b21b1d91f59a6e10432
SHA10b8b0957fbf566dc6cd44528194ee7f6599ce3e6
SHA256d374859bdd78678119c39038e5b689599af21e94002ecd2e52484194583129c4
SHA512acd63b85e48ef50b6670c2de8ae410e62e8ab3851dbc9b524211b9bc05556a7523c1eee733a83310b1263ad92d341305ab9298be4f6c9d8bc461301a56cb659e
-
memory/2852-132-0x00000000008F0000-0x00000000011C6000-memory.dmpFilesize
8.8MB
-
memory/2852-133-0x00000000008F0000-0x00000000011C6000-memory.dmpFilesize
8.8MB
-
memory/2852-134-0x0000000005EA0000-0x0000000006444000-memory.dmpFilesize
5.6MB
-
memory/2852-135-0x0000000003670000-0x00000000036A1000-memory.dmpFilesize
196KB
-
memory/2852-136-0x0000000005AD0000-0x0000000005B36000-memory.dmpFilesize
408KB
-
memory/4072-142-0x0000000000F80000-0x0000000001856000-memory.dmpFilesize
8.8MB
-
memory/4072-143-0x0000000000F80000-0x0000000001856000-memory.dmpFilesize
8.8MB
-
memory/4072-144-0x0000000006310000-0x0000000006311000-memory.dmpFilesize
4KB