Analysis
-
max time kernel
1800s -
max time network
1794s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
29-06-2022 00:55
Static task
static1
Behavioral task
behavioral1
Sample
0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe
Resource
win7-20220414-en
General
-
Target
0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe
-
Size
107KB
-
MD5
0a7135dfdb1bd11de9ce5b3f18fc24af
-
SHA1
7b3afbbc6d639ec0419be1ce9f7d27e3978db290
-
SHA256
0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78
-
SHA512
dd88227dd1cee7f28ec5a9c287f2ca28cc4f08b771618ab48b2cbe4f0cad579e45b58d73ab2243e4e45c54c57ec601ce9766ff43a10130dacc40228600b9f66d
Malware Config
Signatures
-
suricata: ET MALWARE Win32.ServStart.D Checkin
suricata: ET MALWARE Win32.ServStart.D Checkin
-
suricata: ET MALWARE [PTsecurity] Botnet Nitol.B Checkin
suricata: ET MALWARE [PTsecurity] Botnet Nitol.B Checkin
-
Executes dropped EXE 3 IoCs
Processes:
0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78Srv.execaycwq.execaycwqSrv.exepid process 1096 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78Srv.exe 1056 caycwq.exe 1900 caycwqSrv.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78Srv.exe upx C:\Users\Admin\AppData\Local\Temp\0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78Srv.exe upx C:\Users\Admin\AppData\Local\Temp\0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78Srv.exe upx behavioral1/memory/1096-60-0x0000000000400000-0x000000000042E000-memory.dmp upx C:\Windows\caycwq.exe upx C:\Windows\caycwqSrv.exe upx C:\WINDOWS\CAYCWQSRV.EXE upx behavioral1/memory/1900-69-0x0000000000400000-0x000000000042E000-memory.dmp upx C:\PROGRAM FILES (X86)\MICROSOFT\DESKTOPLAYER.EXE upx behavioral1/memory/1504-71-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1056-73-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\WINDOWS\CAYCWQ.EXE upx behavioral1/memory/1056-76-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exepid process 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe -
Drops file in System32 directory 1 IoCs
Processes:
0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exedescription ioc process File opened for modification C:\WINDOWS\SysWOW64\CMD.EXE 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe -
Drops file in Program Files directory 6 IoCs
Processes:
0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78Srv.execaycwqSrv.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\px474.tmp 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\px58D.tmp caycwqSrv.exe File opened for modification C:\PROGRAM FILES (X86)\MICROSOFT\DESKTOPLAYER.EXE caycwqSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe caycwqSrv.exe -
Drops file in Windows directory 4 IoCs
Processes:
caycwqSrv.exe0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.execaycwq.exedescription ioc process File opened for modification C:\WINDOWS\CAYCWQSRV.EXE caycwqSrv.exe File created C:\Windows\caycwq.exe 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe File opened for modification C:\Windows\caycwq.exe 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe File created C:\Windows\caycwqSrv.exe caycwq.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
caycwq.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 caycwq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz caycwq.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.execaycwq.exepid process 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 1056 caycwq.exe -
Suspicious behavior: MapViewOfSection 45 IoCs
Processes:
0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.execaycwq.exepid process 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 1056 caycwq.exe 1056 caycwq.exe 1056 caycwq.exe 1056 caycwq.exe 1056 caycwq.exe 1056 caycwq.exe 1056 caycwq.exe 1056 caycwq.exe 1056 caycwq.exe 1056 caycwq.exe 1056 caycwq.exe 1056 caycwq.exe 1056 caycwq.exe 1056 caycwq.exe 1056 caycwq.exe 1056 caycwq.exe 1056 caycwq.exe 1056 caycwq.exe 1056 caycwq.exe 1056 caycwq.exe 1056 caycwq.exe 1056 caycwq.exe 1056 caycwq.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
Processes:
0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.execaycwq.execaycwqSrv.exedescription pid process Token: SeDebugPrivilege 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe Token: SeDebugPrivilege 1056 caycwq.exe Token: SeTakeOwnershipPrivilege 1900 caycwqSrv.exe Token: SeRestorePrivilege 1900 caycwqSrv.exe Token: SeBackupPrivilege 1900 caycwqSrv.exe Token: SeChangeNotifyPrivilege 1900 caycwqSrv.exe Token: SeTakeOwnershipPrivilege 1900 caycwqSrv.exe Token: SeRestorePrivilege 1900 caycwqSrv.exe Token: SeBackupPrivilege 1900 caycwqSrv.exe Token: SeChangeNotifyPrivilege 1900 caycwqSrv.exe Token: SeTakeOwnershipPrivilege 1900 caycwqSrv.exe Token: SeRestorePrivilege 1900 caycwqSrv.exe Token: SeBackupPrivilege 1900 caycwqSrv.exe Token: SeChangeNotifyPrivilege 1900 caycwqSrv.exe Token: SeTakeOwnershipPrivilege 1900 caycwqSrv.exe Token: SeRestorePrivilege 1900 caycwqSrv.exe Token: SeBackupPrivilege 1900 caycwqSrv.exe Token: SeChangeNotifyPrivilege 1900 caycwqSrv.exe Token: SeTakeOwnershipPrivilege 1900 caycwqSrv.exe Token: SeRestorePrivilege 1900 caycwqSrv.exe Token: SeBackupPrivilege 1900 caycwqSrv.exe Token: SeChangeNotifyPrivilege 1900 caycwqSrv.exe Token: SeTakeOwnershipPrivilege 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe Token: SeRestorePrivilege 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe Token: SeBackupPrivilege 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe Token: SeChangeNotifyPrivilege 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exedescription pid process target process PID 1504 wrote to memory of 1096 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78Srv.exe PID 1504 wrote to memory of 1096 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78Srv.exe PID 1504 wrote to memory of 1096 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78Srv.exe PID 1504 wrote to memory of 1096 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78Srv.exe PID 1504 wrote to memory of 368 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe wininit.exe PID 1504 wrote to memory of 368 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe wininit.exe PID 1504 wrote to memory of 368 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe wininit.exe PID 1504 wrote to memory of 368 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe wininit.exe PID 1504 wrote to memory of 368 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe wininit.exe PID 1504 wrote to memory of 368 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe wininit.exe PID 1504 wrote to memory of 368 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe wininit.exe PID 1504 wrote to memory of 376 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe csrss.exe PID 1504 wrote to memory of 376 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe csrss.exe PID 1504 wrote to memory of 376 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe csrss.exe PID 1504 wrote to memory of 376 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe csrss.exe PID 1504 wrote to memory of 376 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe csrss.exe PID 1504 wrote to memory of 376 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe csrss.exe PID 1504 wrote to memory of 376 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe csrss.exe PID 1504 wrote to memory of 416 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe winlogon.exe PID 1504 wrote to memory of 416 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe winlogon.exe PID 1504 wrote to memory of 416 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe winlogon.exe PID 1504 wrote to memory of 416 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe winlogon.exe PID 1504 wrote to memory of 416 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe winlogon.exe PID 1504 wrote to memory of 416 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe winlogon.exe PID 1504 wrote to memory of 416 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe winlogon.exe PID 1504 wrote to memory of 460 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe services.exe PID 1504 wrote to memory of 460 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe services.exe PID 1504 wrote to memory of 460 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe services.exe PID 1504 wrote to memory of 460 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe services.exe PID 1504 wrote to memory of 460 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe services.exe PID 1504 wrote to memory of 460 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe services.exe PID 1504 wrote to memory of 460 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe services.exe PID 1504 wrote to memory of 472 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe lsass.exe PID 1504 wrote to memory of 472 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe lsass.exe PID 1504 wrote to memory of 472 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe lsass.exe PID 1504 wrote to memory of 472 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe lsass.exe PID 1504 wrote to memory of 472 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe lsass.exe PID 1504 wrote to memory of 472 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe lsass.exe PID 1504 wrote to memory of 472 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe lsass.exe PID 1504 wrote to memory of 480 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe lsm.exe PID 1504 wrote to memory of 480 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe lsm.exe PID 1504 wrote to memory of 480 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe lsm.exe PID 1504 wrote to memory of 480 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe lsm.exe PID 1504 wrote to memory of 480 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe lsm.exe PID 1504 wrote to memory of 480 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe lsm.exe PID 1504 wrote to memory of 480 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe lsm.exe PID 1504 wrote to memory of 576 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe svchost.exe PID 1504 wrote to memory of 576 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe svchost.exe PID 1504 wrote to memory of 576 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe svchost.exe PID 1504 wrote to memory of 576 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe svchost.exe PID 1504 wrote to memory of 576 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe svchost.exe PID 1504 wrote to memory of 576 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe svchost.exe PID 1504 wrote to memory of 576 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe svchost.exe PID 1504 wrote to memory of 652 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe svchost.exe PID 1504 wrote to memory of 652 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe svchost.exe PID 1504 wrote to memory of 652 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe svchost.exe PID 1504 wrote to memory of 652 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe svchost.exe PID 1504 wrote to memory of 652 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe svchost.exe PID 1504 wrote to memory of 652 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe svchost.exe PID 1504 wrote to memory of 652 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe svchost.exe PID 1504 wrote to memory of 740 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe svchost.exe PID 1504 wrote to memory of 740 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe svchost.exe PID 1504 wrote to memory of 740 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe svchost.exe PID 1504 wrote to memory of 740 1504 0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe svchost.exe
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵
-
C:\Windows\caycwq.exeC:\Windows\caycwq.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\caycwqSrv.exeC:\Windows\caycwqSrv.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe"C:\Users\Admin\AppData\Local\Temp\0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78Srv.exeC:\Users\Admin\AppData\Local\Temp\0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78Srv.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵
-
C:\Windows\system32\wininit.exewininit.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\PROGRAM FILES (X86)\MICROSOFT\DESKTOPLAYER.EXEFilesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
C:\Users\Admin\AppData\Local\Temp\0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78Srv.exeFilesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
C:\Users\Admin\AppData\Local\Temp\0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78Srv.exeFilesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
C:\WINDOWS\CAYCWQ.EXEFilesize
107KB
MD50a7135dfdb1bd11de9ce5b3f18fc24af
SHA17b3afbbc6d639ec0419be1ce9f7d27e3978db290
SHA2560dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78
SHA512dd88227dd1cee7f28ec5a9c287f2ca28cc4f08b771618ab48b2cbe4f0cad579e45b58d73ab2243e4e45c54c57ec601ce9766ff43a10130dacc40228600b9f66d
-
C:\WINDOWS\CAYCWQSRV.EXEFilesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
C:\Windows\caycwq.exeFilesize
107KB
MD50a7135dfdb1bd11de9ce5b3f18fc24af
SHA17b3afbbc6d639ec0419be1ce9f7d27e3978db290
SHA2560dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78
SHA512dd88227dd1cee7f28ec5a9c287f2ca28cc4f08b771618ab48b2cbe4f0cad579e45b58d73ab2243e4e45c54c57ec601ce9766ff43a10130dacc40228600b9f66d
-
C:\Windows\caycwqSrv.exeFilesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
\Users\Admin\AppData\Local\Temp\0dee353f6f444308b83d9be0f0d1a49db6b9b35962c0afd5a785ef2cbc018d78Srv.exeFilesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
memory/1056-77-0x0000000000220000-0x000000000024E000-memory.dmpFilesize
184KB
-
memory/1056-76-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/1056-74-0x0000000000220000-0x000000000024E000-memory.dmpFilesize
184KB
-
memory/1056-73-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/1096-60-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1096-61-0x000000007EFA0000-0x000000007EFAC000-memory.dmpFilesize
48KB
-
memory/1096-56-0x0000000000000000-mapping.dmp
-
memory/1504-71-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/1504-72-0x000000007EF90000-0x000000007EF9C000-memory.dmpFilesize
48KB
-
memory/1504-54-0x0000000076561000-0x0000000076563000-memory.dmpFilesize
8KB
-
memory/1900-70-0x000000007EFA0000-0x000000007EFAC000-memory.dmpFilesize
48KB
-
memory/1900-69-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1900-64-0x0000000000000000-mapping.dmp