Analysis
-
max time kernel
164s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
15-02-2022 06:01
Static task
static1
Behavioral task
behavioral1
Sample
cdeeb0f1b8c30d1e55998094064f46c523d637776a16fea2ef92aeefd79f7073.exe
Resource
win7-en-20211208
General
-
Target
cdeeb0f1b8c30d1e55998094064f46c523d637776a16fea2ef92aeefd79f7073.exe
-
Size
2.5MB
-
MD5
3d01438bfca0d5786c9e473f087c4c56
-
SHA1
ec905150408d52283b26c1b283fbf537d9423114
-
SHA256
cdeeb0f1b8c30d1e55998094064f46c523d637776a16fea2ef92aeefd79f7073
-
SHA512
ea236c2b5308345dbe49eab90615a0c9a7d53f6781b427d899de45e3a54236036d352079b7896101c8eea3ff6f1300e758857d8e86d2054a72219c2030c499a6
Malware Config
Extracted
amadey
2.50
depressionk1d.ug/k8FppT/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 3 IoCs
Processes:
rnyuf.exernyuf.exernyuf.exepid process 2536 rnyuf.exe 2168 rnyuf.exe 1748 rnyuf.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
cdeeb0f1b8c30d1e55998094064f46c523d637776a16fea2ef92aeefd79f7073.exernyuf.exernyuf.exernyuf.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cdeeb0f1b8c30d1e55998094064f46c523d637776a16fea2ef92aeefd79f7073.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rnyuf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rnyuf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rnyuf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rnyuf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rnyuf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rnyuf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cdeeb0f1b8c30d1e55998094064f46c523d637776a16fea2ef92aeefd79f7073.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cdeeb0f1b8c30d1e55998094064f46c523d637776a16fea2ef92aeefd79f7073.exernyuf.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation cdeeb0f1b8c30d1e55998094064f46c523d637776a16fea2ef92aeefd79f7073.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation rnyuf.exe -
Processes:
resource yara_rule behavioral2/memory/1400-131-0x0000000000950000-0x0000000000FD8000-memory.dmp themida behavioral2/memory/1400-132-0x0000000000950000-0x0000000000FD8000-memory.dmp themida behavioral2/memory/1400-133-0x0000000000950000-0x0000000000FD8000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\5c436eadc6\rnyuf.exe themida C:\Users\Admin\AppData\Local\Temp\5c436eadc6\rnyuf.exe themida behavioral2/memory/2536-136-0x0000000000370000-0x00000000009F8000-memory.dmp themida behavioral2/memory/2536-137-0x0000000000370000-0x00000000009F8000-memory.dmp themida behavioral2/memory/2536-138-0x0000000000370000-0x00000000009F8000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\5c436eadc6\rnyuf.exe themida behavioral2/memory/2168-141-0x0000000000370000-0x00000000009F8000-memory.dmp themida behavioral2/memory/2168-142-0x0000000000370000-0x00000000009F8000-memory.dmp themida behavioral2/memory/2168-143-0x0000000000370000-0x00000000009F8000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\5c436eadc6\rnyuf.exe themida behavioral2/memory/1748-146-0x0000000000370000-0x00000000009F8000-memory.dmp themida behavioral2/memory/1748-147-0x0000000000370000-0x00000000009F8000-memory.dmp themida behavioral2/memory/1748-148-0x0000000000370000-0x00000000009F8000-memory.dmp themida -
Processes:
rnyuf.execdeeb0f1b8c30d1e55998094064f46c523d637776a16fea2ef92aeefd79f7073.exernyuf.exernyuf.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rnyuf.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cdeeb0f1b8c30d1e55998094064f46c523d637776a16fea2ef92aeefd79f7073.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rnyuf.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rnyuf.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
cdeeb0f1b8c30d1e55998094064f46c523d637776a16fea2ef92aeefd79f7073.exernyuf.exernyuf.exernyuf.exepid process 1400 cdeeb0f1b8c30d1e55998094064f46c523d637776a16fea2ef92aeefd79f7073.exe 2536 rnyuf.exe 2168 rnyuf.exe 1748 rnyuf.exe -
Drops file in Windows directory 3 IoCs
Processes:
TiWorker.exesvchost.exedescription ioc process File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MusNotifyIcon.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 50 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4360" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.184388" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4372" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "1.562522" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132895550022106401" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4144" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.048876" svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
TiWorker.exedescription pid process Token: SeSecurityPrivilege 3364 TiWorker.exe Token: SeRestorePrivilege 3364 TiWorker.exe Token: SeBackupPrivilege 3364 TiWorker.exe Token: SeBackupPrivilege 3364 TiWorker.exe Token: SeRestorePrivilege 3364 TiWorker.exe Token: SeSecurityPrivilege 3364 TiWorker.exe Token: SeBackupPrivilege 3364 TiWorker.exe Token: SeRestorePrivilege 3364 TiWorker.exe Token: SeSecurityPrivilege 3364 TiWorker.exe Token: SeBackupPrivilege 3364 TiWorker.exe Token: SeRestorePrivilege 3364 TiWorker.exe Token: SeSecurityPrivilege 3364 TiWorker.exe Token: SeBackupPrivilege 3364 TiWorker.exe Token: SeRestorePrivilege 3364 TiWorker.exe Token: SeSecurityPrivilege 3364 TiWorker.exe Token: SeBackupPrivilege 3364 TiWorker.exe Token: SeRestorePrivilege 3364 TiWorker.exe Token: SeSecurityPrivilege 3364 TiWorker.exe Token: SeBackupPrivilege 3364 TiWorker.exe Token: SeRestorePrivilege 3364 TiWorker.exe Token: SeSecurityPrivilege 3364 TiWorker.exe Token: SeBackupPrivilege 3364 TiWorker.exe Token: SeRestorePrivilege 3364 TiWorker.exe Token: SeSecurityPrivilege 3364 TiWorker.exe Token: SeBackupPrivilege 3364 TiWorker.exe Token: SeRestorePrivilege 3364 TiWorker.exe Token: SeSecurityPrivilege 3364 TiWorker.exe Token: SeBackupPrivilege 3364 TiWorker.exe Token: SeRestorePrivilege 3364 TiWorker.exe Token: SeSecurityPrivilege 3364 TiWorker.exe Token: SeBackupPrivilege 3364 TiWorker.exe Token: SeRestorePrivilege 3364 TiWorker.exe Token: SeSecurityPrivilege 3364 TiWorker.exe Token: SeBackupPrivilege 3364 TiWorker.exe Token: SeRestorePrivilege 3364 TiWorker.exe Token: SeSecurityPrivilege 3364 TiWorker.exe Token: SeBackupPrivilege 3364 TiWorker.exe Token: SeRestorePrivilege 3364 TiWorker.exe Token: SeSecurityPrivilege 3364 TiWorker.exe Token: SeBackupPrivilege 3364 TiWorker.exe Token: SeRestorePrivilege 3364 TiWorker.exe Token: SeSecurityPrivilege 3364 TiWorker.exe Token: SeBackupPrivilege 3364 TiWorker.exe Token: SeRestorePrivilege 3364 TiWorker.exe Token: SeSecurityPrivilege 3364 TiWorker.exe Token: SeBackupPrivilege 3364 TiWorker.exe Token: SeRestorePrivilege 3364 TiWorker.exe Token: SeSecurityPrivilege 3364 TiWorker.exe Token: SeBackupPrivilege 3364 TiWorker.exe Token: SeRestorePrivilege 3364 TiWorker.exe Token: SeSecurityPrivilege 3364 TiWorker.exe Token: SeBackupPrivilege 3364 TiWorker.exe Token: SeRestorePrivilege 3364 TiWorker.exe Token: SeSecurityPrivilege 3364 TiWorker.exe Token: SeBackupPrivilege 3364 TiWorker.exe Token: SeRestorePrivilege 3364 TiWorker.exe Token: SeSecurityPrivilege 3364 TiWorker.exe Token: SeBackupPrivilege 3364 TiWorker.exe Token: SeRestorePrivilege 3364 TiWorker.exe Token: SeSecurityPrivilege 3364 TiWorker.exe Token: SeBackupPrivilege 3364 TiWorker.exe Token: SeRestorePrivilege 3364 TiWorker.exe Token: SeSecurityPrivilege 3364 TiWorker.exe Token: SeBackupPrivilege 3364 TiWorker.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cdeeb0f1b8c30d1e55998094064f46c523d637776a16fea2ef92aeefd79f7073.exernyuf.execmd.exedescription pid process target process PID 1400 wrote to memory of 2536 1400 cdeeb0f1b8c30d1e55998094064f46c523d637776a16fea2ef92aeefd79f7073.exe rnyuf.exe PID 1400 wrote to memory of 2536 1400 cdeeb0f1b8c30d1e55998094064f46c523d637776a16fea2ef92aeefd79f7073.exe rnyuf.exe PID 1400 wrote to memory of 2536 1400 cdeeb0f1b8c30d1e55998094064f46c523d637776a16fea2ef92aeefd79f7073.exe rnyuf.exe PID 2536 wrote to memory of 3140 2536 rnyuf.exe cmd.exe PID 2536 wrote to memory of 3140 2536 rnyuf.exe cmd.exe PID 2536 wrote to memory of 3140 2536 rnyuf.exe cmd.exe PID 2536 wrote to memory of 984 2536 rnyuf.exe schtasks.exe PID 2536 wrote to memory of 984 2536 rnyuf.exe schtasks.exe PID 2536 wrote to memory of 984 2536 rnyuf.exe schtasks.exe PID 3140 wrote to memory of 3320 3140 cmd.exe reg.exe PID 3140 wrote to memory of 3320 3140 cmd.exe reg.exe PID 3140 wrote to memory of 3320 3140 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdeeb0f1b8c30d1e55998094064f46c523d637776a16fea2ef92aeefd79f7073.exe"C:\Users\Admin\AppData\Local\Temp\cdeeb0f1b8c30d1e55998094064f46c523d637776a16fea2ef92aeefd79f7073.exe"1⤵
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\5c436eadc6\rnyuf.exe"C:\Users\Admin\AppData\Local\Temp\5c436eadc6\rnyuf.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\5c436eadc6\3⤵
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\5c436eadc6\4⤵PID:3320
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rnyuf.exe /TR "C:\Users\Admin\AppData\Local\Temp\5c436eadc6\rnyuf.exe" /F3⤵
- Creates scheduled task(s)
PID:984
-
-
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
PID:2828
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3628
-
C:\Users\Admin\AppData\Local\Temp\5c436eadc6\rnyuf.exeC:\Users\Admin\AppData\Local\Temp\5c436eadc6\rnyuf.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2168
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3364
-
C:\Users\Admin\AppData\Local\Temp\5c436eadc6\rnyuf.exeC:\Users\Admin\AppData\Local\Temp\5c436eadc6\rnyuf.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1748
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
3d01438bfca0d5786c9e473f087c4c56
SHA1ec905150408d52283b26c1b283fbf537d9423114
SHA256cdeeb0f1b8c30d1e55998094064f46c523d637776a16fea2ef92aeefd79f7073
SHA512ea236c2b5308345dbe49eab90615a0c9a7d53f6781b427d899de45e3a54236036d352079b7896101c8eea3ff6f1300e758857d8e86d2054a72219c2030c499a6
-
MD5
3d01438bfca0d5786c9e473f087c4c56
SHA1ec905150408d52283b26c1b283fbf537d9423114
SHA256cdeeb0f1b8c30d1e55998094064f46c523d637776a16fea2ef92aeefd79f7073
SHA512ea236c2b5308345dbe49eab90615a0c9a7d53f6781b427d899de45e3a54236036d352079b7896101c8eea3ff6f1300e758857d8e86d2054a72219c2030c499a6
-
MD5
3d01438bfca0d5786c9e473f087c4c56
SHA1ec905150408d52283b26c1b283fbf537d9423114
SHA256cdeeb0f1b8c30d1e55998094064f46c523d637776a16fea2ef92aeefd79f7073
SHA512ea236c2b5308345dbe49eab90615a0c9a7d53f6781b427d899de45e3a54236036d352079b7896101c8eea3ff6f1300e758857d8e86d2054a72219c2030c499a6
-
MD5
3d01438bfca0d5786c9e473f087c4c56
SHA1ec905150408d52283b26c1b283fbf537d9423114
SHA256cdeeb0f1b8c30d1e55998094064f46c523d637776a16fea2ef92aeefd79f7073
SHA512ea236c2b5308345dbe49eab90615a0c9a7d53f6781b427d899de45e3a54236036d352079b7896101c8eea3ff6f1300e758857d8e86d2054a72219c2030c499a6