Analysis
-
max time kernel
153s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
11/02/2022, 06:22
Static task
static1
Behavioral task
behavioral1
Sample
fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe
Resource
win10v2004-en-20220112
General
-
Target
fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe
-
Size
53KB
-
MD5
2fad8cc7c9cb5fedc34797dfa0fcc495
-
SHA1
6307bd1178e16d0392f590477f783e93a52a4e6d
-
SHA256
fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc
-
SHA512
7aa6edfa8787d98dea92fa1349e4eeeef4eb4fd288533c6a4b006e0be2dd8050c0d9d3107bab18ff27be5901d053142183cf05bfae1f024ed7867c9896f5f704
Malware Config
Extracted
C:\how_to_back_files.html
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 2200 created 2768 2200 WerFault.exe 75 -
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\DismountBlock.raw => C:\Users\Admin\Pictures\DismountBlock.raw.grlock fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File renamed C:\Users\Admin\Pictures\HideClear.crw => C:\Users\Admin\Pictures\HideClear.crw.grlock fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File renamed C:\Users\Admin\Pictures\MountConvertTo.png => C:\Users\Admin\Pictures\MountConvertTo.png.grlock fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File renamed C:\Users\Admin\Pictures\RemoveSkip.crw => C:\Users\Admin\Pictures\RemoveSkip.crw.grlock fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe" fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe -
Drops desktop.ini file(s) 24 IoCs
description ioc Process File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File opened for modification C:\Users\Admin\Links\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File opened for modification C:\Users\Public\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File opened for modification C:\Users\Public\Downloads\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File opened for modification C:\Users\Public\Desktop\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File opened for modification C:\Users\Admin\Documents\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File opened for modification C:\Users\Public\Videos\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File opened for modification C:\Users\Public\Libraries\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File opened for modification C:\Users\Admin\Searches\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File opened for modification C:\Users\Public\Music\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File opened for modification C:\Users\Public\Documents\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File opened for modification C:\Users\Admin\Music\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File opened for modification C:\Users\Public\Pictures\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe File opened for modification C:\Users\Admin\Videos\desktop.ini fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1820 2768 WerFault.exe 75 1816 2768 WerFault.exe 75 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe -
Modifies data under HKEY_USERS 19 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" svchost.exe -
Modifies registry class 30 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "7425" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\www.bing.com SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "7425" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "173" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "1980" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "2291" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "2291" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\MuiCache SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\bing.com SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "173" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "1980" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "2291" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "7425" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "173" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "1980" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Speech_OneCore\\Recognizers\\Tokens\\MS-1033-110-WINMO-DNN" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2768 SearchApp.exe Token: SeRestorePrivilege 2768 SearchApp.exe Token: SeTakeOwnershipPrivilege 2768 SearchApp.exe Token: SeRestorePrivilege 2768 SearchApp.exe Token: SeTakeOwnershipPrivilege 2768 SearchApp.exe Token: SeRestorePrivilege 2768 SearchApp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2768 SearchApp.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2768 2200 WerFault.exe 75 PID 2200 wrote to memory of 2768 2200 WerFault.exe 75 PID 2768 wrote to memory of 1816 2768 SearchApp.exe 82 PID 2768 wrote to memory of 1816 2768 SearchApp.exe 82 PID 2768 wrote to memory of 1816 2768 SearchApp.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe"C:\Users\Admin\AppData\Local\Temp\fb636a09db563786131245c126902069a9d83f697908a4b78f52ccaf721ccbbc.exe"1⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
PID:3940
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
PID:2140
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2768 -s 44762⤵
- Program crash
PID:1820
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2768 -s 44762⤵
- Program crash
PID:1816
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 428 -p 2768 -ip 27681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:2200
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Modifies data under HKEY_USERS
PID:1860