Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 17:37
Static task
static1
Behavioral task
behavioral1
Sample
748a09ee75795e741e3d15dfa38b4869ae4bb4c574c30197f9c7d0f023e8eb66.exe
Resource
win7-20220414-en
General
-
Target
748a09ee75795e741e3d15dfa38b4869ae4bb4c574c30197f9c7d0f023e8eb66.exe
-
Size
322KB
-
MD5
deacce089de71aa3d685e4b5fd84cccb
-
SHA1
0e59ed3c487e54e188012ad9990553b4eae04624
-
SHA256
748a09ee75795e741e3d15dfa38b4869ae4bb4c574c30197f9c7d0f023e8eb66
-
SHA512
34ac9e7d7a2d05d82726d54d1325dc46aa230ceea164b8de725c0660947b90fcadb69ad59225af00275f6384d13b841dc6ceb756772f20a608fd602bd4c615b4
Malware Config
Signatures
-
Detects PlugX Payload 6 IoCs
resource yara_rule behavioral1/memory/2032-67-0x0000000000460000-0x00000000004B1000-memory.dmp family_plugx behavioral1/memory/1884-77-0x0000000001C30000-0x0000000001C81000-memory.dmp family_plugx behavioral1/memory/1228-78-0x00000000002E0000-0x0000000000331000-memory.dmp family_plugx behavioral1/memory/516-87-0x0000000000390000-0x00000000003E1000-memory.dmp family_plugx behavioral1/memory/1228-88-0x00000000002E0000-0x0000000000331000-memory.dmp family_plugx behavioral1/memory/516-89-0x0000000000390000-0x00000000003E1000-memory.dmp family_plugx -
Executes dropped EXE 3 IoCs
pid Process 2032 ssonsvr.exe 1884 ssonsvr.exe 796 AOFVPMJXVT.exe -
Deletes itself 1 IoCs
pid Process 1228 svchost.exe -
Loads dropped DLL 8 IoCs
pid Process 1648 748a09ee75795e741e3d15dfa38b4869ae4bb4c574c30197f9c7d0f023e8eb66.exe 1648 748a09ee75795e741e3d15dfa38b4869ae4bb4c574c30197f9c7d0f023e8eb66.exe 1648 748a09ee75795e741e3d15dfa38b4869ae4bb4c574c30197f9c7d0f023e8eb66.exe 1648 748a09ee75795e741e3d15dfa38b4869ae4bb4c574c30197f9c7d0f023e8eb66.exe 2032 ssonsvr.exe 1884 ssonsvr.exe 1228 svchost.exe 1228 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 460000000d000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f006c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{79CDD3F5-1EF6-4429-A7FA-510B0F5C5F29} svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{79CDD3F5-1EF6-4429-A7FA-510B0F5C5F29}\WpadDecisionTime = 7023bdadcb88d801 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 460000000e000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f006c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{79CDD3F5-1EF6-4429-A7FA-510B0F5C5F29}\WpadDecisionTime = b0cf8094cb88d801 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{79CDD3F5-1EF6-4429-A7FA-510B0F5C5F29}\WpadDecisionTime = 70877da7cb88d801 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-54-da-38-6d-62\WpadDecision = "0" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-54-da-38-6d-62\WpadDecisionTime = b0cf8094cb88d801 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{79CDD3F5-1EF6-4429-A7FA-510B0F5C5F29}\WpadDecision = "0" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-54-da-38-6d-62\WpadDecisionTime = 5036ff87cb88d801 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{79CDD3F5-1EF6-4429-A7FA-510B0F5C5F29}\WpadDecisionTime = d04c40a1cb88d801 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-54-da-38-6d-62\WpadDecisionTime = d04c40a1cb88d801 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{79CDD3F5-1EF6-4429-A7FA-510B0F5C5F29}\WpadDecisionTime = 50d374c0cb88d801 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{79CDD3F5-1EF6-4429-A7FA-510B0F5C5F29}\WpadDecisionTime = 5036ff87cb88d801 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-54-da-38-6d-62\WpadDecisionTime = 50d374c0cb88d801 svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-54-da-38-6d-62 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-54-da-38-6d-62\WpadDecisionTime = 70877da7cb88d801 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-54-da-38-6d-62\WpadDecisionTime = 7023bdadcb88d801 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-54-da-38-6d-62\WpadDetectedUrl svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{79CDD3F5-1EF6-4429-A7FA-510B0F5C5F29}\WpadDecisionTime = b0fbc181cb88d801 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{79CDD3F5-1EF6-4429-A7FA-510B0F5C5F29}\ca-54-da-38-6d-62 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{79CDD3F5-1EF6-4429-A7FA-510B0F5C5F29}\WpadDecisionTime = 7039d89acb88d801 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 460000000a000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f006c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{79CDD3F5-1EF6-4429-A7FA-510B0F5C5F29}\WpadDecisionTime = b0205a79cb88d801 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000006000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f006c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000007000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f006c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{79CDD3F5-1EF6-4429-A7FA-510B0F5C5F29}\WpadDecisionReason = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{79CDD3F5-1EF6-4429-A7FA-510B0F5C5F29}\WpadNetworkName = "Network 3" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-54-da-38-6d-62\WpadDecisionTime = b0205a79cb88d801 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000008000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f006c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 460000000c000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f006c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-54-da-38-6d-62\WpadDecisionTime = b0fbc181cb88d801 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f006c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{79CDD3F5-1EF6-4429-A7FA-510B0F5C5F29}\WpadDecisionTime = 50d23e8ecb88d801 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-54-da-38-6d-62\WpadDecisionTime = 7039d89acb88d801 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 460000000b000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f006c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{79CDD3F5-1EF6-4429-A7FA-510B0F5C5F29}\WpadDecisionTime = d020ffb3cb88d801 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-54-da-38-6d-62\WpadDecisionTime = d020ffb3cb88d801 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-54-da-38-6d-62\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000005000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f006c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000009000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f006c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f006c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\FAST svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 46003900390031003200360030004600390039003300440030003500340034000000 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1228 svchost.exe 796 AOFVPMJXVT.exe 1228 svchost.exe 1228 svchost.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 1228 svchost.exe 1228 svchost.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 1228 svchost.exe 1228 svchost.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 1228 svchost.exe 1228 svchost.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 1228 svchost.exe 1228 svchost.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 1228 svchost.exe 1228 svchost.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 1228 svchost.exe 1228 svchost.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe 516 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2032 ssonsvr.exe Token: SeTcbPrivilege 2032 ssonsvr.exe Token: SeDebugPrivilege 1884 ssonsvr.exe Token: SeTcbPrivilege 1884 ssonsvr.exe Token: SeDebugPrivilege 1228 svchost.exe Token: SeTcbPrivilege 1228 svchost.exe Token: SeTcbPrivilege 796 AOFVPMJXVT.exe Token: SeDebugPrivilege 796 AOFVPMJXVT.exe Token: SeDebugPrivilege 516 msiexec.exe Token: SeTcbPrivilege 516 msiexec.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2032 1648 748a09ee75795e741e3d15dfa38b4869ae4bb4c574c30197f9c7d0f023e8eb66.exe 27 PID 1648 wrote to memory of 2032 1648 748a09ee75795e741e3d15dfa38b4869ae4bb4c574c30197f9c7d0f023e8eb66.exe 27 PID 1648 wrote to memory of 2032 1648 748a09ee75795e741e3d15dfa38b4869ae4bb4c574c30197f9c7d0f023e8eb66.exe 27 PID 1648 wrote to memory of 2032 1648 748a09ee75795e741e3d15dfa38b4869ae4bb4c574c30197f9c7d0f023e8eb66.exe 27 PID 1648 wrote to memory of 2032 1648 748a09ee75795e741e3d15dfa38b4869ae4bb4c574c30197f9c7d0f023e8eb66.exe 27 PID 1648 wrote to memory of 2032 1648 748a09ee75795e741e3d15dfa38b4869ae4bb4c574c30197f9c7d0f023e8eb66.exe 27 PID 1648 wrote to memory of 2032 1648 748a09ee75795e741e3d15dfa38b4869ae4bb4c574c30197f9c7d0f023e8eb66.exe 27 PID 1884 wrote to memory of 1228 1884 ssonsvr.exe 29 PID 1884 wrote to memory of 1228 1884 ssonsvr.exe 29 PID 1884 wrote to memory of 1228 1884 ssonsvr.exe 29 PID 1884 wrote to memory of 1228 1884 ssonsvr.exe 29 PID 1884 wrote to memory of 1228 1884 ssonsvr.exe 29 PID 1884 wrote to memory of 1228 1884 ssonsvr.exe 29 PID 1884 wrote to memory of 1228 1884 ssonsvr.exe 29 PID 1884 wrote to memory of 1228 1884 ssonsvr.exe 29 PID 1884 wrote to memory of 1228 1884 ssonsvr.exe 29 PID 1228 wrote to memory of 796 1228 svchost.exe 30 PID 1228 wrote to memory of 796 1228 svchost.exe 30 PID 1228 wrote to memory of 796 1228 svchost.exe 30 PID 1228 wrote to memory of 796 1228 svchost.exe 30 PID 796 wrote to memory of 464 796 AOFVPMJXVT.exe 2 PID 1228 wrote to memory of 516 1228 svchost.exe 31 PID 1228 wrote to memory of 516 1228 svchost.exe 31 PID 1228 wrote to memory of 516 1228 svchost.exe 31 PID 1228 wrote to memory of 516 1228 svchost.exe 31 PID 1228 wrote to memory of 516 1228 svchost.exe 31 PID 1228 wrote to memory of 516 1228 svchost.exe 31 PID 1228 wrote to memory of 516 1228 svchost.exe 31 PID 1228 wrote to memory of 516 1228 svchost.exe 31 PID 1228 wrote to memory of 516 1228 svchost.exe 31 PID 1228 wrote to memory of 516 1228 svchost.exe 31 PID 1228 wrote to memory of 516 1228 svchost.exe 31 PID 1228 wrote to memory of 516 1228 svchost.exe 31
Processes
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:464
-
C:\ProgramData\Citrix\system32\ssonsvr.exeC:\ProgramData\Citrix\system32\ssonsvr.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 201 03⤵
- Deletes itself
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\TEMP\AOFVPMJXVT.exe"C:\Windows\TEMP\AOFVPMJXVT.exe" cpsvcs4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:796
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe 209 12284⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\748a09ee75795e741e3d15dfa38b4869ae4bb4c574c30197f9c7d0f023e8eb66.exe"C:\Users\Admin\AppData\Local\Temp\748a09ee75795e741e3d15dfa38b4869ae4bb4c574c30197f9c7d0f023e8eb66.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\ssonsvr.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\ssonsvr.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5a76fbb2a878893b41f70962073fbdcca
SHA10b58c21bfd06866365b7e423173fa1e170f4474b
SHA2563e987f2505da7ddc77d206ac8a7cea86697fc5dfcfb6673ff08b25f2946f39df
SHA5122d6ec27db4323a7c15b9263b9c021afa11c8340f0f005748e1978a03e1021977647afcb085dfcf41c06277d7faf0078e8211acf0f4f3a1c08901039f666774b7
-
Filesize
212KB
MD5ee9d96f6a545fe8dee85ec568bca55d9
SHA195b3e29697d04d6c005be0327b2fd99161aaaf82
SHA256f50a36f032f7ecd6426a3463d8b1070ee3ada96f6ff52dd053aeb605ecb1da22
SHA512a5b077483b2664b7ff95b2712bed3e55cdc84119fe53ffc2280891a020f630009724160b02702f4f7db6a349e1293fcbb1a0202024567e3e12cc67eb9cff11a9
-
Filesize
33KB
MD59388e298ac0ba3b6a0784a9be3919515
SHA1195a2621131d526b582ad8bb34bfa70eb499ba70
SHA256d0d9604cbff27ddb233d13b7c84265638c3be1d45a7302428134c5e20c222a05
SHA5129fd369c35447e7a308cb7422b883276c41197048c28a19b78e84fd90eff70849ed479a898a7d6a35f0362c267994ad5d4acf784e685a209a627e0893adc4730b
-
Filesize
4KB
MD5a76fbb2a878893b41f70962073fbdcca
SHA10b58c21bfd06866365b7e423173fa1e170f4474b
SHA2563e987f2505da7ddc77d206ac8a7cea86697fc5dfcfb6673ff08b25f2946f39df
SHA5122d6ec27db4323a7c15b9263b9c021afa11c8340f0f005748e1978a03e1021977647afcb085dfcf41c06277d7faf0078e8211acf0f4f3a1c08901039f666774b7
-
Filesize
212KB
MD5ee9d96f6a545fe8dee85ec568bca55d9
SHA195b3e29697d04d6c005be0327b2fd99161aaaf82
SHA256f50a36f032f7ecd6426a3463d8b1070ee3ada96f6ff52dd053aeb605ecb1da22
SHA512a5b077483b2664b7ff95b2712bed3e55cdc84119fe53ffc2280891a020f630009724160b02702f4f7db6a349e1293fcbb1a0202024567e3e12cc67eb9cff11a9
-
Filesize
33KB
MD59388e298ac0ba3b6a0784a9be3919515
SHA1195a2621131d526b582ad8bb34bfa70eb499ba70
SHA256d0d9604cbff27ddb233d13b7c84265638c3be1d45a7302428134c5e20c222a05
SHA5129fd369c35447e7a308cb7422b883276c41197048c28a19b78e84fd90eff70849ed479a898a7d6a35f0362c267994ad5d4acf784e685a209a627e0893adc4730b
-
Filesize
33KB
MD59388e298ac0ba3b6a0784a9be3919515
SHA1195a2621131d526b582ad8bb34bfa70eb499ba70
SHA256d0d9604cbff27ddb233d13b7c84265638c3be1d45a7302428134c5e20c222a05
SHA5129fd369c35447e7a308cb7422b883276c41197048c28a19b78e84fd90eff70849ed479a898a7d6a35f0362c267994ad5d4acf784e685a209a627e0893adc4730b
-
Filesize
11KB
MD56622918d92a44e67175f7aeb3fcb5a05
SHA10b226563fa229783bea7aa27e28f908967c729e6
SHA256b0e1832ff379dfbfeac0aa26ba49188019d2aa7a5ead67256ef7f10ed8a6c62c
SHA51265ff16d6d4eb4308f5950dec33b7598c10da54e4ae124107f19159675cc2cc445da8b70a5cb5f509b7c988358f1973b77b3be361d712a3cd44bda6e3697008fe
-
Filesize
4KB
MD5a76fbb2a878893b41f70962073fbdcca
SHA10b58c21bfd06866365b7e423173fa1e170f4474b
SHA2563e987f2505da7ddc77d206ac8a7cea86697fc5dfcfb6673ff08b25f2946f39df
SHA5122d6ec27db4323a7c15b9263b9c021afa11c8340f0f005748e1978a03e1021977647afcb085dfcf41c06277d7faf0078e8211acf0f4f3a1c08901039f666774b7
-
Filesize
4KB
MD5a76fbb2a878893b41f70962073fbdcca
SHA10b58c21bfd06866365b7e423173fa1e170f4474b
SHA2563e987f2505da7ddc77d206ac8a7cea86697fc5dfcfb6673ff08b25f2946f39df
SHA5122d6ec27db4323a7c15b9263b9c021afa11c8340f0f005748e1978a03e1021977647afcb085dfcf41c06277d7faf0078e8211acf0f4f3a1c08901039f666774b7
-
Filesize
33KB
MD59388e298ac0ba3b6a0784a9be3919515
SHA1195a2621131d526b582ad8bb34bfa70eb499ba70
SHA256d0d9604cbff27ddb233d13b7c84265638c3be1d45a7302428134c5e20c222a05
SHA5129fd369c35447e7a308cb7422b883276c41197048c28a19b78e84fd90eff70849ed479a898a7d6a35f0362c267994ad5d4acf784e685a209a627e0893adc4730b
-
Filesize
33KB
MD59388e298ac0ba3b6a0784a9be3919515
SHA1195a2621131d526b582ad8bb34bfa70eb499ba70
SHA256d0d9604cbff27ddb233d13b7c84265638c3be1d45a7302428134c5e20c222a05
SHA5129fd369c35447e7a308cb7422b883276c41197048c28a19b78e84fd90eff70849ed479a898a7d6a35f0362c267994ad5d4acf784e685a209a627e0893adc4730b
-
Filesize
33KB
MD59388e298ac0ba3b6a0784a9be3919515
SHA1195a2621131d526b582ad8bb34bfa70eb499ba70
SHA256d0d9604cbff27ddb233d13b7c84265638c3be1d45a7302428134c5e20c222a05
SHA5129fd369c35447e7a308cb7422b883276c41197048c28a19b78e84fd90eff70849ed479a898a7d6a35f0362c267994ad5d4acf784e685a209a627e0893adc4730b
-
Filesize
33KB
MD59388e298ac0ba3b6a0784a9be3919515
SHA1195a2621131d526b582ad8bb34bfa70eb499ba70
SHA256d0d9604cbff27ddb233d13b7c84265638c3be1d45a7302428134c5e20c222a05
SHA5129fd369c35447e7a308cb7422b883276c41197048c28a19b78e84fd90eff70849ed479a898a7d6a35f0362c267994ad5d4acf784e685a209a627e0893adc4730b
-
Filesize
11KB
MD56622918d92a44e67175f7aeb3fcb5a05
SHA10b226563fa229783bea7aa27e28f908967c729e6
SHA256b0e1832ff379dfbfeac0aa26ba49188019d2aa7a5ead67256ef7f10ed8a6c62c
SHA51265ff16d6d4eb4308f5950dec33b7598c10da54e4ae124107f19159675cc2cc445da8b70a5cb5f509b7c988358f1973b77b3be361d712a3cd44bda6e3697008fe
-
Filesize
11KB
MD56622918d92a44e67175f7aeb3fcb5a05
SHA10b226563fa229783bea7aa27e28f908967c729e6
SHA256b0e1832ff379dfbfeac0aa26ba49188019d2aa7a5ead67256ef7f10ed8a6c62c
SHA51265ff16d6d4eb4308f5950dec33b7598c10da54e4ae124107f19159675cc2cc445da8b70a5cb5f509b7c988358f1973b77b3be361d712a3cd44bda6e3697008fe