Analysis
-
max time kernel
170s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
17/02/2022, 02:50
Behavioral task
behavioral1
Sample
5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe
Resource
win10v2004-en-20220112
General
-
Target
5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe
-
Size
1.3MB
-
MD5
3cb0236969a2ff8768a00c408f607b92
-
SHA1
2ad7048a2242149a632aa30f4ab21faca74330ab
-
SHA256
5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e
-
SHA512
c0a3d01a45ece6012721fb6dd4a3c7e158cb964cd1b263072a33d64eff2e9983134eb3f49280e0a56e1428e56b21e8cf20af65494d9d135581ddb7b40380788e
Malware Config
Extracted
warzonerat
wealth.warzonedns.com:5202
Signatures
-
NetWire RAT payload 12 IoCs
resource yara_rule behavioral2/files/0x0016000000009f80-130.dat netwire behavioral2/files/0x0016000000009f80-131.dat netwire behavioral2/files/0x000400000001ed18-139.dat netwire behavioral2/files/0x000400000001ed18-140.dat netwire behavioral2/files/0x000400000001ed1a-144.dat netwire behavioral2/files/0x000400000001ed1a-145.dat netwire behavioral2/files/0x0016000000009f80-146.dat netwire behavioral2/files/0x000400000001ed1a-154.dat netwire behavioral2/files/0x0016000000009f80-158.dat netwire behavioral2/files/0x000400000001ed1a-159.dat netwire behavioral2/files/0x0016000000009f80-160.dat netwire behavioral2/files/0x000400000001ed1a-168.dat netwire -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 6 IoCs
resource yara_rule behavioral2/memory/2736-132-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral2/memory/2736-141-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral2/memory/3592-147-0x0000000000C00000-0x0000000000C1D000-memory.dmp warzonerat behavioral2/memory/3592-155-0x0000000000C00000-0x0000000000C1D000-memory.dmp warzonerat behavioral2/memory/2948-161-0x0000000000140000-0x000000000015D000-memory.dmp warzonerat behavioral2/memory/2948-169-0x0000000000140000-0x000000000015D000-memory.dmp warzonerat -
Executes dropped EXE 8 IoCs
pid Process 2824 Blasthost.exe 2264 Host.exe 4032 RtDCpl64.exe 988 Blasthost.exe 3592 RtDCpl64.exe 1328 RtDCpl64.exe 2808 Blasthost.exe 2948 RtDCpl64.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation RtDCpl64.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation RtDCpl64.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 404 set thread context of 2736 404 5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe 62 PID 4032 set thread context of 3592 4032 RtDCpl64.exe 84 PID 1328 set thread context of 2948 1328 RtDCpl64.exe 100 -
autoit_exe 5 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000400000001ed1a-144.dat autoit_exe behavioral2/files/0x000400000001ed1a-145.dat autoit_exe behavioral2/files/0x000400000001ed1a-154.dat autoit_exe behavioral2/files/0x000400000001ed1a-159.dat autoit_exe behavioral2/files/0x000400000001ed1a-168.dat autoit_exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3316 schtasks.exe 1316 schtasks.exe 4080 schtasks.exe -
Modifies data under HKEY_USERS 49 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132897174902543641" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "5.882030" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.000000" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4284" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4076" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "1.239697" svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 3140 TiWorker.exe Token: SeRestorePrivilege 3140 TiWorker.exe Token: SeBackupPrivilege 3140 TiWorker.exe Token: SeBackupPrivilege 3140 TiWorker.exe Token: SeRestorePrivilege 3140 TiWorker.exe Token: SeSecurityPrivilege 3140 TiWorker.exe Token: SeBackupPrivilege 3140 TiWorker.exe Token: SeRestorePrivilege 3140 TiWorker.exe Token: SeSecurityPrivilege 3140 TiWorker.exe Token: SeBackupPrivilege 3140 TiWorker.exe Token: SeRestorePrivilege 3140 TiWorker.exe Token: SeSecurityPrivilege 3140 TiWorker.exe Token: SeBackupPrivilege 3140 TiWorker.exe Token: SeRestorePrivilege 3140 TiWorker.exe Token: SeSecurityPrivilege 3140 TiWorker.exe Token: SeBackupPrivilege 3140 TiWorker.exe Token: SeRestorePrivilege 3140 TiWorker.exe Token: SeSecurityPrivilege 3140 TiWorker.exe Token: SeBackupPrivilege 3140 TiWorker.exe Token: SeRestorePrivilege 3140 TiWorker.exe Token: SeSecurityPrivilege 3140 TiWorker.exe Token: SeBackupPrivilege 3140 TiWorker.exe Token: SeRestorePrivilege 3140 TiWorker.exe Token: SeSecurityPrivilege 3140 TiWorker.exe Token: SeBackupPrivilege 3140 TiWorker.exe Token: SeRestorePrivilege 3140 TiWorker.exe Token: SeSecurityPrivilege 3140 TiWorker.exe Token: SeBackupPrivilege 3140 TiWorker.exe Token: SeRestorePrivilege 3140 TiWorker.exe Token: SeSecurityPrivilege 3140 TiWorker.exe Token: SeBackupPrivilege 3140 TiWorker.exe Token: SeRestorePrivilege 3140 TiWorker.exe Token: SeSecurityPrivilege 3140 TiWorker.exe Token: SeBackupPrivilege 3140 TiWorker.exe Token: SeRestorePrivilege 3140 TiWorker.exe Token: SeSecurityPrivilege 3140 TiWorker.exe Token: SeBackupPrivilege 3140 TiWorker.exe Token: SeRestorePrivilege 3140 TiWorker.exe Token: SeSecurityPrivilege 3140 TiWorker.exe Token: SeBackupPrivilege 3140 TiWorker.exe Token: SeRestorePrivilege 3140 TiWorker.exe Token: SeSecurityPrivilege 3140 TiWorker.exe Token: SeBackupPrivilege 3140 TiWorker.exe Token: SeRestorePrivilege 3140 TiWorker.exe Token: SeSecurityPrivilege 3140 TiWorker.exe Token: SeBackupPrivilege 3140 TiWorker.exe Token: SeRestorePrivilege 3140 TiWorker.exe Token: SeSecurityPrivilege 3140 TiWorker.exe Token: SeBackupPrivilege 3140 TiWorker.exe Token: SeRestorePrivilege 3140 TiWorker.exe Token: SeSecurityPrivilege 3140 TiWorker.exe Token: SeBackupPrivilege 3140 TiWorker.exe Token: SeRestorePrivilege 3140 TiWorker.exe Token: SeSecurityPrivilege 3140 TiWorker.exe Token: SeBackupPrivilege 3140 TiWorker.exe Token: SeRestorePrivilege 3140 TiWorker.exe Token: SeSecurityPrivilege 3140 TiWorker.exe Token: SeBackupPrivilege 3140 TiWorker.exe Token: SeRestorePrivilege 3140 TiWorker.exe Token: SeSecurityPrivilege 3140 TiWorker.exe Token: SeBackupPrivilege 3140 TiWorker.exe Token: SeRestorePrivilege 3140 TiWorker.exe Token: SeSecurityPrivilege 3140 TiWorker.exe Token: SeBackupPrivilege 3140 TiWorker.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 404 wrote to memory of 2824 404 5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe 61 PID 404 wrote to memory of 2824 404 5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe 61 PID 404 wrote to memory of 2824 404 5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe 61 PID 404 wrote to memory of 2736 404 5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe 62 PID 404 wrote to memory of 2736 404 5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe 62 PID 404 wrote to memory of 2736 404 5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe 62 PID 404 wrote to memory of 2736 404 5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe 62 PID 404 wrote to memory of 2736 404 5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe 62 PID 2824 wrote to memory of 2264 2824 Blasthost.exe 63 PID 2824 wrote to memory of 2264 2824 Blasthost.exe 63 PID 2824 wrote to memory of 2264 2824 Blasthost.exe 63 PID 404 wrote to memory of 4080 404 5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe 64 PID 404 wrote to memory of 4080 404 5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe 64 PID 404 wrote to memory of 4080 404 5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe 64 PID 2736 wrote to memory of 1148 2736 5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe 66 PID 2736 wrote to memory of 1148 2736 5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe 66 PID 2736 wrote to memory of 1148 2736 5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe 66 PID 2736 wrote to memory of 1148 2736 5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe 66 PID 2736 wrote to memory of 1148 2736 5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe 66 PID 4032 wrote to memory of 988 4032 RtDCpl64.exe 82 PID 4032 wrote to memory of 988 4032 RtDCpl64.exe 82 PID 4032 wrote to memory of 988 4032 RtDCpl64.exe 82 PID 4032 wrote to memory of 3592 4032 RtDCpl64.exe 84 PID 4032 wrote to memory of 3592 4032 RtDCpl64.exe 84 PID 4032 wrote to memory of 3592 4032 RtDCpl64.exe 84 PID 4032 wrote to memory of 3592 4032 RtDCpl64.exe 84 PID 4032 wrote to memory of 3592 4032 RtDCpl64.exe 84 PID 3592 wrote to memory of 3340 3592 RtDCpl64.exe 85 PID 3592 wrote to memory of 3340 3592 RtDCpl64.exe 85 PID 3592 wrote to memory of 3340 3592 RtDCpl64.exe 85 PID 4032 wrote to memory of 3316 4032 RtDCpl64.exe 87 PID 4032 wrote to memory of 3316 4032 RtDCpl64.exe 87 PID 4032 wrote to memory of 3316 4032 RtDCpl64.exe 87 PID 3592 wrote to memory of 3340 3592 RtDCpl64.exe 85 PID 3592 wrote to memory of 3340 3592 RtDCpl64.exe 85 PID 1328 wrote to memory of 2808 1328 RtDCpl64.exe 99 PID 1328 wrote to memory of 2808 1328 RtDCpl64.exe 99 PID 1328 wrote to memory of 2808 1328 RtDCpl64.exe 99 PID 1328 wrote to memory of 2948 1328 RtDCpl64.exe 100 PID 1328 wrote to memory of 2948 1328 RtDCpl64.exe 100 PID 1328 wrote to memory of 2948 1328 RtDCpl64.exe 100 PID 1328 wrote to memory of 2948 1328 RtDCpl64.exe 100 PID 1328 wrote to memory of 2948 1328 RtDCpl64.exe 100 PID 2948 wrote to memory of 3016 2948 RtDCpl64.exe 101 PID 2948 wrote to memory of 3016 2948 RtDCpl64.exe 101 PID 2948 wrote to memory of 3016 2948 RtDCpl64.exe 101 PID 1328 wrote to memory of 1316 1328 RtDCpl64.exe 102 PID 1328 wrote to memory of 1316 1328 RtDCpl64.exe 102 PID 1328 wrote to memory of 1316 1328 RtDCpl64.exe 102 PID 2948 wrote to memory of 3016 2948 RtDCpl64.exe 101 PID 2948 wrote to memory of 3016 2948 RtDCpl64.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe"C:\Users\Admin\AppData\Local\Temp\5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"3⤵
- Executes dropped EXE
PID:2264
-
-
-
C:\Users\Admin\AppData\Local\Temp\5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe"C:\Users\Admin\AppData\Local\Temp\5eaea71b3861fe7127ac68929b357587d1f29a5a9f8d4cc1b184ef142308dd4e.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:1148
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:4080
-
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
PID:3320
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
PID:988
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:3340
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:3316
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2552
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3140
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
PID:2808
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:3016
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:1316
-