Analysis
-
max time kernel
300s -
max time network
90s -
platform
windows7_x64 -
resource
win7-20220414-en -
resource tags
arch:x64arch:x86image:win7-20220414-enlocale:en-usos:windows7-x64system -
submitted
15-07-2022 15:01
Static task
static1
Behavioral task
behavioral1
Sample
362e56855844fb2be3dfae4b566ab676f6ec681fad1c1a2e8eb6d245d56b83f5.msi
Resource
win7-20220414-en
General
-
Target
362e56855844fb2be3dfae4b566ab676f6ec681fad1c1a2e8eb6d245d56b83f5.msi
-
Size
676KB
-
MD5
a0d132cdc67c29abf79ecf455c4a4e25
-
SHA1
2b278de35e52d695b27e1c880d35db04daa982bf
-
SHA256
362e56855844fb2be3dfae4b566ab676f6ec681fad1c1a2e8eb6d245d56b83f5
-
SHA512
645d2e3a168667de44d04756f48fe1d7d6581efc0755dccd72f6e09e603300783777b3b3376bb0d2bfab4c1ad3d239845eb606acffc3ea4ea4261d451c427ddf
Malware Config
Extracted
qakbot
403.780
vip01
1657721813
67.209.195.198:443
63.143.92.99:995
148.64.96.100:443
72.252.157.93:990
72.252.157.93:995
89.101.97.139:443
76.25.142.196:443
47.180.172.159:443
67.165.206.193:993
32.221.224.140:995
70.46.220.114:443
176.45.218.138:995
174.69.215.101:443
24.54.48.11:443
86.97.10.37:443
81.158.239.251:2078
37.34.253.233:443
120.150.218.241:995
186.90.153.162:2222
38.70.253.226:2222
41.228.22.180:443
217.165.157.202:995
179.111.8.52:32101
172.115.177.204:2222
190.252.242.69:443
31.215.185.213:1194
208.107.221.224:443
24.158.23.166:995
70.51.137.244:2222
39.44.116.107:995
31.215.185.213:2222
47.23.89.60:993
24.55.67.176:443
93.48.80.198:995
24.139.72.117:443
69.14.172.24:443
197.89.11.169:443
66.230.104.103:443
92.132.132.81:2222
24.178.196.158:2222
174.80.15.101:2083
187.116.126.216:32101
100.38.242.113:995
37.186.58.99:995
84.241.8.23:32103
182.191.92.203:995
40.134.246.185:995
106.193.213.197:995
86.98.78.118:993
117.248.109.38:21
74.14.5.179:2222
39.49.48.167:995
172.114.160.81:443
179.158.105.44:443
196.203.37.215:80
94.59.15.180:2222
39.52.55.99:995
89.211.209.234:2222
1.161.118.53:995
94.36.193.176:2222
121.7.223.45:2222
104.34.212.7:32103
45.46.53.140:2222
118.163.113.140:443
173.21.10.71:2222
47.145.130.171:443
47.156.129.52:443
72.252.157.93:993
187.172.164.12:443
197.94.92.5:443
201.172.23.72:2222
82.41.63.217:443
109.12.111.14:443
85.6.232.221:2222
96.37.113.36:993
217.128.122.65:2222
2.178.120.112:61202
193.136.1.58:443
103.133.11.10:995
120.61.3.142:443
182.52.159.24:443
37.208.131.49:50010
173.174.216.62:443
103.246.242.202:443
106.51.48.188:50001
67.69.166.79:2222
45.241.254.69:993
88.240.59.52:443
39.41.18.76:995
86.213.75.30:2078
39.57.56.11:995
24.43.99.75:443
101.50.67.155:995
108.56.213.219:995
189.253.167.141:443
5.32.41.45:443
39.53.160.99:995
80.11.74.81:2222
41.84.224.109:443
103.116.178.85:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
msiexec.exemsiexec.exeflow pid process 2 1672 msiexec.exe 3 1476 msiexec.exe -
Loads dropped DLL 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 1612 regsvr32.exe 900 regsvr32.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Windows directory 10 IoCs
Processes:
DrvInst.exemsiexec.exedescription ioc process File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File created C:\Windows\Installer\6c6134.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI662F.tmp msiexec.exe File created C:\Windows\Installer\6c6137.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\6c6135.ipi msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\6c6134.msi msiexec.exe File created C:\Windows\Installer\6c6135.ipi msiexec.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 55 IoCs
Processes:
DrvInst.exeexplorer.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Fkbaprhvu\c3fb7d50 = 695ccad1dcc2c6e491bb2b6eeaf0751171a786b4ab9621 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Fkbaprhvu explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Fkbaprhvu\3191a58d = b06aa88629e961ff24ba26437d1aaf512dc5ad9255e1679be1e7c473ef06ac25ecf6a9dc4ed01e15314ea558b041b0b903e0117dd78b4214a810893ba083e6e5a3678aafab415e12bc8bf8fd23f54251bb5346 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Fkbaprhvu\bcb212a6 = d092a378efc6f0ff21a7f02c09b4f783bc43929f4231855f explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Fkbaprhvu\3191a58d = b06abf8629e952c7b1de23906e9a2e1740b5083a4030f9f2ea67bbc21b03787423ca57d581132e82610f289da2987aebe651bcd698845c78de9f755cf645d997bea8cc71047286dc8910fc1958192a71e149c910c9075761348d94f9105f5583c813bbb1e3f97ba0 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = e0b9aee16c98d801 powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Fkbaprhvu\bef332da = 24c32bbaddeda64261b6893d839b6d1175bb2a164f55bf7274f3e0b1e8dbf27fd87ef95960d27db254b1694d17f550837575cc74bdc15b386966b633b6 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Fkbaprhvu\7b471a35 = f76365b41c2993c30a17ebcaac17c91a64442e0a59df888f4ae32753fe14828e65fc1ce6a76b7a3f8ad3f7f39b9e293f7aacaa2c6b7e0bc5dd1d6e65bf53470dcf044f009fec0c95d24e0348c2d0c8791059885ea415019cdc3cd607a57a666353771f3425848691d44529dc978407b0 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Fkbaprhvu\64f55bf = 2dbee1bdf4d31ea558784c424016b7e3450d514214178eedefea35ff8018d21581acd0 explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Fkbaprhvu\40e75c3 = a404a83e5b69cf5a772116910dc4d3e4bf59647428f36f3cacc23775f76669707b40dfcaef1dc45a7b27f59b7a9f92ee68a6b4da0038e360caddfc8e6c320e694e33cda7de092c60220105bd95be02dad664304c3a5fbe4e545662dd69a998108167340a259f1094e2415488885f963a50bda30e319ee3dc2efa7a93bc9fe9f7013c0abfd8a179af035d9ebb887cba8c28760fc98d87a0b094fe90417ca6125d2c266b2ce77b1ea7f2eb461723f2b3 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Fkbaprhvu\4ed8ca7b = 1b441c2760c0408bcb52ae574ab5603813a122712b654d84de4a0aeee88f17c65f94f15dc9029c8fe3cdc846c1165724dbd32d7078c9aa36a92b472ae513d1d9611fe6ccb43d0adb17e88559a1f393f0b240b064126f6ae1c1723800dcedc11e53 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
msiexec.exeregsvr32.exeexplorer.exepowershell.exeregsvr32.exepid process 1476 msiexec.exe 1476 msiexec.exe 1612 regsvr32.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 952 powershell.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 900 regsvr32.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe 820 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 1612 regsvr32.exe 900 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exevssvc.exeDrvInst.exedescription pid process Token: SeShutdownPrivilege 1672 msiexec.exe Token: SeIncreaseQuotaPrivilege 1672 msiexec.exe Token: SeRestorePrivilege 1476 msiexec.exe Token: SeTakeOwnershipPrivilege 1476 msiexec.exe Token: SeSecurityPrivilege 1476 msiexec.exe Token: SeCreateTokenPrivilege 1672 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1672 msiexec.exe Token: SeLockMemoryPrivilege 1672 msiexec.exe Token: SeIncreaseQuotaPrivilege 1672 msiexec.exe Token: SeMachineAccountPrivilege 1672 msiexec.exe Token: SeTcbPrivilege 1672 msiexec.exe Token: SeSecurityPrivilege 1672 msiexec.exe Token: SeTakeOwnershipPrivilege 1672 msiexec.exe Token: SeLoadDriverPrivilege 1672 msiexec.exe Token: SeSystemProfilePrivilege 1672 msiexec.exe Token: SeSystemtimePrivilege 1672 msiexec.exe Token: SeProfSingleProcessPrivilege 1672 msiexec.exe Token: SeIncBasePriorityPrivilege 1672 msiexec.exe Token: SeCreatePagefilePrivilege 1672 msiexec.exe Token: SeCreatePermanentPrivilege 1672 msiexec.exe Token: SeBackupPrivilege 1672 msiexec.exe Token: SeRestorePrivilege 1672 msiexec.exe Token: SeShutdownPrivilege 1672 msiexec.exe Token: SeDebugPrivilege 1672 msiexec.exe Token: SeAuditPrivilege 1672 msiexec.exe Token: SeSystemEnvironmentPrivilege 1672 msiexec.exe Token: SeChangeNotifyPrivilege 1672 msiexec.exe Token: SeRemoteShutdownPrivilege 1672 msiexec.exe Token: SeUndockPrivilege 1672 msiexec.exe Token: SeSyncAgentPrivilege 1672 msiexec.exe Token: SeEnableDelegationPrivilege 1672 msiexec.exe Token: SeManageVolumePrivilege 1672 msiexec.exe Token: SeImpersonatePrivilege 1672 msiexec.exe Token: SeCreateGlobalPrivilege 1672 msiexec.exe Token: SeBackupPrivilege 844 vssvc.exe Token: SeRestorePrivilege 844 vssvc.exe Token: SeAuditPrivilege 844 vssvc.exe Token: SeBackupPrivilege 1476 msiexec.exe Token: SeRestorePrivilege 1476 msiexec.exe Token: SeRestorePrivilege 1348 DrvInst.exe Token: SeRestorePrivilege 1348 DrvInst.exe Token: SeRestorePrivilege 1348 DrvInst.exe Token: SeRestorePrivilege 1348 DrvInst.exe Token: SeRestorePrivilege 1348 DrvInst.exe Token: SeRestorePrivilege 1348 DrvInst.exe Token: SeRestorePrivilege 1348 DrvInst.exe Token: SeLoadDriverPrivilege 1348 DrvInst.exe Token: SeLoadDriverPrivilege 1348 DrvInst.exe Token: SeLoadDriverPrivilege 1348 DrvInst.exe Token: SeRestorePrivilege 1476 msiexec.exe Token: SeTakeOwnershipPrivilege 1476 msiexec.exe Token: SeRestorePrivilege 1476 msiexec.exe Token: SeTakeOwnershipPrivilege 1476 msiexec.exe Token: SeRestorePrivilege 1476 msiexec.exe Token: SeTakeOwnershipPrivilege 1476 msiexec.exe Token: SeRestorePrivilege 1476 msiexec.exe Token: SeTakeOwnershipPrivilege 1476 msiexec.exe Token: SeRestorePrivilege 1476 msiexec.exe Token: SeTakeOwnershipPrivilege 1476 msiexec.exe Token: SeRestorePrivilege 1476 msiexec.exe Token: SeTakeOwnershipPrivilege 1476 msiexec.exe Token: SeRestorePrivilege 1476 msiexec.exe Token: SeTakeOwnershipPrivilege 1476 msiexec.exe Token: SeRestorePrivilege 1476 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msiexec.exepid process 1672 msiexec.exe 1672 msiexec.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
msiexec.exeregsvr32.exeregsvr32.exeexplorer.exetaskeng.exepowershell.exeregsvr32.exeregsvr32.exedescription pid process target process PID 1476 wrote to memory of 1140 1476 msiexec.exe regsvr32.exe PID 1476 wrote to memory of 1140 1476 msiexec.exe regsvr32.exe PID 1476 wrote to memory of 1140 1476 msiexec.exe regsvr32.exe PID 1476 wrote to memory of 1140 1476 msiexec.exe regsvr32.exe PID 1476 wrote to memory of 1140 1476 msiexec.exe regsvr32.exe PID 1476 wrote to memory of 1016 1476 msiexec.exe wscript.exe PID 1476 wrote to memory of 1016 1476 msiexec.exe wscript.exe PID 1476 wrote to memory of 1016 1476 msiexec.exe wscript.exe PID 1140 wrote to memory of 1612 1140 regsvr32.exe regsvr32.exe PID 1140 wrote to memory of 1612 1140 regsvr32.exe regsvr32.exe PID 1140 wrote to memory of 1612 1140 regsvr32.exe regsvr32.exe PID 1140 wrote to memory of 1612 1140 regsvr32.exe regsvr32.exe PID 1140 wrote to memory of 1612 1140 regsvr32.exe regsvr32.exe PID 1140 wrote to memory of 1612 1140 regsvr32.exe regsvr32.exe PID 1140 wrote to memory of 1612 1140 regsvr32.exe regsvr32.exe PID 1612 wrote to memory of 820 1612 regsvr32.exe explorer.exe PID 1612 wrote to memory of 820 1612 regsvr32.exe explorer.exe PID 1612 wrote to memory of 820 1612 regsvr32.exe explorer.exe PID 1612 wrote to memory of 820 1612 regsvr32.exe explorer.exe PID 1612 wrote to memory of 820 1612 regsvr32.exe explorer.exe PID 1612 wrote to memory of 820 1612 regsvr32.exe explorer.exe PID 820 wrote to memory of 316 820 explorer.exe schtasks.exe PID 820 wrote to memory of 316 820 explorer.exe schtasks.exe PID 820 wrote to memory of 316 820 explorer.exe schtasks.exe PID 820 wrote to memory of 316 820 explorer.exe schtasks.exe PID 964 wrote to memory of 952 964 taskeng.exe powershell.exe PID 964 wrote to memory of 952 964 taskeng.exe powershell.exe PID 964 wrote to memory of 952 964 taskeng.exe powershell.exe PID 952 wrote to memory of 776 952 powershell.exe regsvr32.exe PID 952 wrote to memory of 776 952 powershell.exe regsvr32.exe PID 952 wrote to memory of 776 952 powershell.exe regsvr32.exe PID 952 wrote to memory of 776 952 powershell.exe regsvr32.exe PID 952 wrote to memory of 776 952 powershell.exe regsvr32.exe PID 776 wrote to memory of 900 776 regsvr32.exe regsvr32.exe PID 776 wrote to memory of 900 776 regsvr32.exe regsvr32.exe PID 776 wrote to memory of 900 776 regsvr32.exe regsvr32.exe PID 776 wrote to memory of 900 776 regsvr32.exe regsvr32.exe PID 776 wrote to memory of 900 776 regsvr32.exe regsvr32.exe PID 776 wrote to memory of 900 776 regsvr32.exe regsvr32.exe PID 776 wrote to memory of 900 776 regsvr32.exe regsvr32.exe PID 900 wrote to memory of 1640 900 regsvr32.exe explorer.exe PID 900 wrote to memory of 1640 900 regsvr32.exe explorer.exe PID 900 wrote to memory of 1640 900 regsvr32.exe explorer.exe PID 900 wrote to memory of 1640 900 regsvr32.exe explorer.exe PID 900 wrote to memory of 1640 900 regsvr32.exe explorer.exe PID 900 wrote to memory of 1640 900 regsvr32.exe explorer.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\362e56855844fb2be3dfae4b566ab676f6ec681fad1c1a2e8eb6d245d56b83f5.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -n -i:"Install" C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-n -i:"Install" C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:04 /tn kjdfaqvvkv /ET 17:15 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABBAGQAbwBiAGUARgBvAG4AdABQAGEAYwBrAFwAbQBhAGkAbgAuAGQAbABsACIA" /SC ONCE5⤵
- Creates scheduled task(s)
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\AdobeFontPack\notify.vbs2⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000240" "00000000000004AC"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskeng.exetaskeng.exe {871882CD-646B-44C1-B072-CAA9A065BC6A} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABBAGQAbwBiAGUARgBvAG4AdABQAGEAYwBrAFwAbQBhAGkAbgAuAGQAbABsACIA2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeC:\Users\Admin\AppData\Local\AdobeFontPack\main.dll4⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe5⤵
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
60KB
MD5589c442fc7a0c70dca927115a700d41e
SHA166a07dace3afbfd1aa07a47e6875beab62c4bb31
SHA2562e5cb72e9eb43baafb6c6bfcc573aac92f49a8064c483f9d378a9e8e781a526a
SHA5121b5fa79e52be495c42cf49618441fb7012e28c02e7a08a91da9213db3ab810f0e83485bc1dd5f625a47d0ba7cfcdd5ea50acc9a8dcebb39f048c40f01e94155b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
340B
MD580f60e8179d5162c54af67174cba0260
SHA1eac2c19aabdfbf72100de39bb211709a93920a43
SHA256e5f4befdd51d28fe06ef780327a693402ecf17e903fac09fcc09c42ad5f83886
SHA512eda44da8fa44347998be94417f530fd48a78e38310aabddc90d14f449f2dfb5754af89739b2df7df836339102ca002c68cfc86e443efc95b74b35f66d1742f0e
-
C:\Users\Admin\AppData\Local\AdobeFontPack\main.dllFilesize
1.3MB
MD52fce945f0621e3812618f55c4a3926e9
SHA165aa7e9e33d25ee812e9ac86f45488c6c531d9ad
SHA256c7dfc591c7dc5371c60bd0fb1cc7ca2c14dd630a0e7272b4fac98e8d2ee5567a
SHA51295a6c8761952b43c238094fba672c0c15d011ff0af69b5100b37a52ab9b00f355337a15787fea95bd31038a4dff5a1cdfeffa70b006849f66027dcd72f2b1614
-
C:\Users\Admin\AppData\Local\AdobeFontPack\main.dllFilesize
1.3MB
MD52fce945f0621e3812618f55c4a3926e9
SHA165aa7e9e33d25ee812e9ac86f45488c6c531d9ad
SHA256c7dfc591c7dc5371c60bd0fb1cc7ca2c14dd630a0e7272b4fac98e8d2ee5567a
SHA51295a6c8761952b43c238094fba672c0c15d011ff0af69b5100b37a52ab9b00f355337a15787fea95bd31038a4dff5a1cdfeffa70b006849f66027dcd72f2b1614
-
C:\Users\Admin\AppData\Local\AdobeFontPack\notify.vbsFilesize
68B
MD50308aa2c8dab8a69de41f5d16679bb9b
SHA1c6827bf44a433ff086e787653361859d6f6e2fb3
SHA2560a7e8fd68575db5f84c18b9a26e4058323d1357e2a29a5b12278e4bfa6939489
SHA5121a1ca92e3c8d52c8b5adbb3117a88d8a2a8c33eaf2f7b0d620fe006653f57f4ba0b803884616594ca31e13a1b0b59ddae52cecf044621ec44371084dac6beb72
-
\??\PIPE\wkssvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\AdobeFontPack\main.dllFilesize
1.3MB
MD52fce945f0621e3812618f55c4a3926e9
SHA165aa7e9e33d25ee812e9ac86f45488c6c531d9ad
SHA256c7dfc591c7dc5371c60bd0fb1cc7ca2c14dd630a0e7272b4fac98e8d2ee5567a
SHA51295a6c8761952b43c238094fba672c0c15d011ff0af69b5100b37a52ab9b00f355337a15787fea95bd31038a4dff5a1cdfeffa70b006849f66027dcd72f2b1614
-
\Users\Admin\AppData\Local\AdobeFontPack\main.dllFilesize
1.3MB
MD52fce945f0621e3812618f55c4a3926e9
SHA165aa7e9e33d25ee812e9ac86f45488c6c531d9ad
SHA256c7dfc591c7dc5371c60bd0fb1cc7ca2c14dd630a0e7272b4fac98e8d2ee5567a
SHA51295a6c8761952b43c238094fba672c0c15d011ff0af69b5100b37a52ab9b00f355337a15787fea95bd31038a4dff5a1cdfeffa70b006849f66027dcd72f2b1614
-
memory/316-78-0x0000000000000000-mapping.dmp
-
memory/776-85-0x0000000000000000-mapping.dmp
-
memory/820-77-0x0000000000080000-0x00000000000A2000-memory.dmpFilesize
136KB
-
memory/820-79-0x0000000000080000-0x00000000000A2000-memory.dmpFilesize
136KB
-
memory/820-74-0x0000000074441000-0x0000000074443000-memory.dmpFilesize
8KB
-
memory/820-72-0x0000000000000000-mapping.dmp
-
memory/900-96-0x00000000002E0000-0x0000000000302000-memory.dmpFilesize
136KB
-
memory/900-90-0x0000000000000000-mapping.dmp
-
memory/900-93-0x0000000000BE0000-0x0000000000D26000-memory.dmpFilesize
1.3MB
-
memory/900-94-0x00000000002E0000-0x0000000000302000-memory.dmpFilesize
136KB
-
memory/900-95-0x00000000002E0000-0x0000000000302000-memory.dmpFilesize
136KB
-
memory/900-97-0x0000000000200000-0x0000000000222000-memory.dmpFilesize
136KB
-
memory/900-98-0x00000000002E0000-0x0000000000302000-memory.dmpFilesize
136KB
-
memory/900-102-0x00000000002E0000-0x0000000000302000-memory.dmpFilesize
136KB
-
memory/952-88-0x0000000001044000-0x0000000001047000-memory.dmpFilesize
12KB
-
memory/952-80-0x0000000000000000-mapping.dmp
-
memory/952-82-0x000007FEF3EE0000-0x000007FEF4903000-memory.dmpFilesize
10.1MB
-
memory/952-83-0x000007FEF3380000-0x000007FEF3EDD000-memory.dmpFilesize
11.4MB
-
memory/952-84-0x0000000001044000-0x0000000001047000-memory.dmpFilesize
12KB
-
memory/952-89-0x000000000104B000-0x000000000106A000-memory.dmpFilesize
124KB
-
memory/1016-59-0x0000000000000000-mapping.dmp
-
memory/1140-58-0x0000000000000000-mapping.dmp
-
memory/1612-64-0x00000000753B1000-0x00000000753B3000-memory.dmpFilesize
8KB
-
memory/1612-70-0x00000000001F0000-0x0000000000212000-memory.dmpFilesize
136KB
-
memory/1612-69-0x00000000003A0000-0x00000000003C2000-memory.dmpFilesize
136KB
-
memory/1612-68-0x00000000003A0000-0x00000000003C2000-memory.dmpFilesize
136KB
-
memory/1612-67-0x00000000003A0000-0x00000000003C2000-memory.dmpFilesize
136KB
-
memory/1612-66-0x0000000000591000-0x000000000068E000-memory.dmpFilesize
1012KB
-
memory/1612-63-0x0000000000000000-mapping.dmp
-
memory/1612-71-0x00000000003A0000-0x00000000003C2000-memory.dmpFilesize
136KB
-
memory/1612-76-0x00000000003A0000-0x00000000003C2000-memory.dmpFilesize
136KB
-
memory/1640-99-0x0000000000000000-mapping.dmp
-
memory/1640-103-0x00000000000C0000-0x00000000000E2000-memory.dmpFilesize
136KB
-
memory/1640-104-0x00000000000C0000-0x00000000000E2000-memory.dmpFilesize
136KB
-
memory/1672-54-0x000007FEFBAA1000-0x000007FEFBAA3000-memory.dmpFilesize
8KB