Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows7_x64 -
resource
win7-20220414-en -
resource tags
arch:x64arch:x86image:win7-20220414-enlocale:en-usos:windows7-x64system -
submitted
15-07-2022 15:08
Static task
static1
Behavioral task
behavioral1
Sample
PDF_3028225.msi
Resource
win7-20220414-en
General
-
Target
PDF_3028225.msi
-
Size
484KB
-
MD5
47847ac5f01e037c1a18becc0dfd4611
-
SHA1
d6f37b18252787c2c2c31358e741d9b834440331
-
SHA256
7d1c0c7e4cbfe49926451ab6365455e5f3889fb17e2508afa9f6e2ebeedaa2c1
-
SHA512
7630b223cddfc31ef7afee9972ab4a5100b048d35f526211e331f4717260e2c29b0962ad35271701b00c5c379f7798004f5140abe8dbc88ddf083d8b2ee78004
Malware Config
Extracted
qakbot
403.780
vip01
1657631718
47.23.89.60:993
37.34.253.233:443
196.203.37.215:80
89.211.209.234:2222
81.158.239.251:2078
179.111.8.52:32101
208.107.221.224:443
24.158.23.166:995
66.230.104.103:443
92.132.132.81:2222
24.139.72.117:443
174.80.15.101:2083
24.178.196.158:2222
100.38.242.113:995
37.186.58.99:995
24.55.67.176:443
74.14.5.179:2222
172.114.160.81:443
40.134.246.185:995
63.143.92.99:995
67.209.195.198:443
179.158.105.44:443
148.64.96.100:443
111.125.245.116:995
32.221.224.140:995
117.248.109.38:21
84.241.8.23:32103
47.180.172.159:443
70.46.220.114:443
109.12.111.14:443
176.45.218.138:995
89.101.97.139:443
121.7.223.45:2222
24.54.48.11:443
94.59.15.180:2222
120.150.218.241:995
187.116.126.216:32101
186.90.153.162:2222
38.70.253.226:2222
104.34.212.7:32103
41.228.22.180:443
217.165.157.202:995
67.165.206.193:993
86.98.78.118:993
172.115.177.204:2222
1.161.79.116:443
82.41.63.217:443
85.6.232.221:2222
93.48.80.198:995
1.161.79.116:995
86.97.10.37:443
174.69.215.101:443
45.46.53.140:2222
197.87.182.135:443
197.94.219.121:443
96.37.113.36:993
76.25.142.196:443
173.21.10.71:2222
217.128.122.65:2222
47.145.130.171:443
47.156.129.52:443
187.172.164.12:443
72.252.157.93:990
72.252.157.93:993
190.252.242.69:443
72.252.157.93:995
69.14.172.24:443
2.178.120.112:61202
70.51.137.244:2222
94.36.193.176:2222
81.193.30.90:443
103.133.11.10:995
120.61.3.142:443
182.52.159.24:443
201.172.23.72:2222
37.208.131.49:50010
173.174.216.62:443
103.246.242.202:443
106.51.48.188:50001
182.191.92.203:995
86.97.246.166:1194
67.69.166.79:2222
45.241.254.69:993
39.49.41.221:995
88.240.59.52:443
39.44.60.200:995
39.52.59.221:995
39.41.16.210:995
217.164.119.30:2222
86.213.75.30:2078
39.57.56.11:995
24.43.99.75:443
101.50.67.155:995
108.56.213.219:995
189.253.167.141:443
5.32.41.45:443
39.53.124.57:995
80.11.74.81:2222
41.84.224.109:443
103.116.178.85:995
184.97.29.26:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
msiexec.exemsiexec.exeflow pid process 2 944 msiexec.exe 3 1976 msiexec.exe -
Loads dropped DLL 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 1612 regsvr32.exe 2000 regsvr32.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\I: msiexec.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Windows directory 10 IoCs
Processes:
msiexec.exeDrvInst.exedescription ioc process File opened for modification C:\Windows\Installer\6c71f6.msi msiexec.exe File created C:\Windows\Installer\6c71f7.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI76E2.tmp msiexec.exe File created C:\Windows\Installer\6c71f9.msi msiexec.exe File opened for modification C:\Windows\Installer\6c71f7.ipi msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\6c71f6.msi msiexec.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 45 IoCs
Processes:
DrvInst.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 20ab09dc6d98d801 powershell.exe -
Suspicious behavior: EnumeratesProcesses 53 IoCs
Processes:
msiexec.exeregsvr32.exeexplorer.exepowershell.exeregsvr32.exepid process 1976 msiexec.exe 1976 msiexec.exe 1612 regsvr32.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1492 powershell.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 2000 regsvr32.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe 1308 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
regsvr32.exepid process 1612 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exevssvc.exeDrvInst.exedescription pid process Token: SeShutdownPrivilege 944 msiexec.exe Token: SeIncreaseQuotaPrivilege 944 msiexec.exe Token: SeRestorePrivilege 1976 msiexec.exe Token: SeTakeOwnershipPrivilege 1976 msiexec.exe Token: SeSecurityPrivilege 1976 msiexec.exe Token: SeCreateTokenPrivilege 944 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 944 msiexec.exe Token: SeLockMemoryPrivilege 944 msiexec.exe Token: SeIncreaseQuotaPrivilege 944 msiexec.exe Token: SeMachineAccountPrivilege 944 msiexec.exe Token: SeTcbPrivilege 944 msiexec.exe Token: SeSecurityPrivilege 944 msiexec.exe Token: SeTakeOwnershipPrivilege 944 msiexec.exe Token: SeLoadDriverPrivilege 944 msiexec.exe Token: SeSystemProfilePrivilege 944 msiexec.exe Token: SeSystemtimePrivilege 944 msiexec.exe Token: SeProfSingleProcessPrivilege 944 msiexec.exe Token: SeIncBasePriorityPrivilege 944 msiexec.exe Token: SeCreatePagefilePrivilege 944 msiexec.exe Token: SeCreatePermanentPrivilege 944 msiexec.exe Token: SeBackupPrivilege 944 msiexec.exe Token: SeRestorePrivilege 944 msiexec.exe Token: SeShutdownPrivilege 944 msiexec.exe Token: SeDebugPrivilege 944 msiexec.exe Token: SeAuditPrivilege 944 msiexec.exe Token: SeSystemEnvironmentPrivilege 944 msiexec.exe Token: SeChangeNotifyPrivilege 944 msiexec.exe Token: SeRemoteShutdownPrivilege 944 msiexec.exe Token: SeUndockPrivilege 944 msiexec.exe Token: SeSyncAgentPrivilege 944 msiexec.exe Token: SeEnableDelegationPrivilege 944 msiexec.exe Token: SeManageVolumePrivilege 944 msiexec.exe Token: SeImpersonatePrivilege 944 msiexec.exe Token: SeCreateGlobalPrivilege 944 msiexec.exe Token: SeBackupPrivilege 1960 vssvc.exe Token: SeRestorePrivilege 1960 vssvc.exe Token: SeAuditPrivilege 1960 vssvc.exe Token: SeBackupPrivilege 1976 msiexec.exe Token: SeRestorePrivilege 1976 msiexec.exe Token: SeRestorePrivilege 1720 DrvInst.exe Token: SeRestorePrivilege 1720 DrvInst.exe Token: SeRestorePrivilege 1720 DrvInst.exe Token: SeRestorePrivilege 1720 DrvInst.exe Token: SeRestorePrivilege 1720 DrvInst.exe Token: SeRestorePrivilege 1720 DrvInst.exe Token: SeRestorePrivilege 1720 DrvInst.exe Token: SeLoadDriverPrivilege 1720 DrvInst.exe Token: SeLoadDriverPrivilege 1720 DrvInst.exe Token: SeLoadDriverPrivilege 1720 DrvInst.exe Token: SeRestorePrivilege 1976 msiexec.exe Token: SeTakeOwnershipPrivilege 1976 msiexec.exe Token: SeRestorePrivilege 1976 msiexec.exe Token: SeTakeOwnershipPrivilege 1976 msiexec.exe Token: SeRestorePrivilege 1976 msiexec.exe Token: SeTakeOwnershipPrivilege 1976 msiexec.exe Token: SeRestorePrivilege 1976 msiexec.exe Token: SeTakeOwnershipPrivilege 1976 msiexec.exe Token: SeRestorePrivilege 1976 msiexec.exe Token: SeTakeOwnershipPrivilege 1976 msiexec.exe Token: SeRestorePrivilege 1976 msiexec.exe Token: SeTakeOwnershipPrivilege 1976 msiexec.exe Token: SeRestorePrivilege 1976 msiexec.exe Token: SeTakeOwnershipPrivilege 1976 msiexec.exe Token: SeRestorePrivilege 1976 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msiexec.exepid process 944 msiexec.exe 944 msiexec.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
msiexec.exeregsvr32.exeregsvr32.exeexplorer.exetaskeng.exepowershell.exeregsvr32.exedescription pid process target process PID 1976 wrote to memory of 920 1976 msiexec.exe wscript.exe PID 1976 wrote to memory of 920 1976 msiexec.exe wscript.exe PID 1976 wrote to memory of 920 1976 msiexec.exe wscript.exe PID 1976 wrote to memory of 540 1976 msiexec.exe regsvr32.exe PID 1976 wrote to memory of 540 1976 msiexec.exe regsvr32.exe PID 1976 wrote to memory of 540 1976 msiexec.exe regsvr32.exe PID 1976 wrote to memory of 540 1976 msiexec.exe regsvr32.exe PID 1976 wrote to memory of 540 1976 msiexec.exe regsvr32.exe PID 540 wrote to memory of 1612 540 regsvr32.exe regsvr32.exe PID 540 wrote to memory of 1612 540 regsvr32.exe regsvr32.exe PID 540 wrote to memory of 1612 540 regsvr32.exe regsvr32.exe PID 540 wrote to memory of 1612 540 regsvr32.exe regsvr32.exe PID 540 wrote to memory of 1612 540 regsvr32.exe regsvr32.exe PID 540 wrote to memory of 1612 540 regsvr32.exe regsvr32.exe PID 540 wrote to memory of 1612 540 regsvr32.exe regsvr32.exe PID 1612 wrote to memory of 1308 1612 regsvr32.exe explorer.exe PID 1612 wrote to memory of 1308 1612 regsvr32.exe explorer.exe PID 1612 wrote to memory of 1308 1612 regsvr32.exe explorer.exe PID 1612 wrote to memory of 1308 1612 regsvr32.exe explorer.exe PID 1612 wrote to memory of 1308 1612 regsvr32.exe explorer.exe PID 1612 wrote to memory of 1308 1612 regsvr32.exe explorer.exe PID 1308 wrote to memory of 1176 1308 explorer.exe schtasks.exe PID 1308 wrote to memory of 1176 1308 explorer.exe schtasks.exe PID 1308 wrote to memory of 1176 1308 explorer.exe schtasks.exe PID 1308 wrote to memory of 1176 1308 explorer.exe schtasks.exe PID 824 wrote to memory of 1492 824 taskeng.exe powershell.exe PID 824 wrote to memory of 1492 824 taskeng.exe powershell.exe PID 824 wrote to memory of 1492 824 taskeng.exe powershell.exe PID 1492 wrote to memory of 624 1492 powershell.exe regsvr32.exe PID 1492 wrote to memory of 624 1492 powershell.exe regsvr32.exe PID 1492 wrote to memory of 624 1492 powershell.exe regsvr32.exe PID 1492 wrote to memory of 624 1492 powershell.exe regsvr32.exe PID 1492 wrote to memory of 624 1492 powershell.exe regsvr32.exe PID 624 wrote to memory of 2000 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 2000 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 2000 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 2000 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 2000 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 2000 624 regsvr32.exe regsvr32.exe PID 624 wrote to memory of 2000 624 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\PDF_3028225.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\AdobeFontPack\notify.vbs2⤵
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -n -i:"Install" C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-n -i:"Install" C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:11 /tn leokczi /ET 17:22 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABBAGQAbwBiAGUARgBvAG4AdABQAGEAYwBrAFwAbQBhAGkAbgAuAGQAbABsACIA" /SC ONCE5⤵
- Creates scheduled task(s)
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000060" "000000000000005C"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskeng.exetaskeng.exe {DF0D23CB-0B7E-4503-B714-1250D1E01A74} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABBAGQAbwBiAGUARgBvAG4AdABQAGEAYwBrAFwAbQBhAGkAbgAuAGQAbABsACIA2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeC:\Users\Admin\AppData\Local\AdobeFontPack\main.dll4⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
60KB
MD5589c442fc7a0c70dca927115a700d41e
SHA166a07dace3afbfd1aa07a47e6875beab62c4bb31
SHA2562e5cb72e9eb43baafb6c6bfcc573aac92f49a8064c483f9d378a9e8e781a526a
SHA5121b5fa79e52be495c42cf49618441fb7012e28c02e7a08a91da9213db3ab810f0e83485bc1dd5f625a47d0ba7cfcdd5ea50acc9a8dcebb39f048c40f01e94155b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
340B
MD5b187c0eba69b055624c5b56870681a90
SHA12f5b77045816b599039a81eb796d3b8b04a31c07
SHA256847c4eb51c85495fa151e06a35b4ff4e37b2e3ef1a52292917ad36e3cfd12536
SHA5126d67d5dfb767b65b1abfdc2364642b120c10bcbe02bb45804a71a9792e185750d9bf344360b67ede807c3b8dc9af0f67183db7920cc55fcb96fe9b351e7458e7
-
C:\Users\Admin\AppData\Local\AdobeFontPack\main.dllFilesize
777KB
MD5926382093a313282f4a1639944f3fb0c
SHA1851380d94deeb031aad806795d760f3982399850
SHA2561ce7c87d8dc79ace14eb2a1be829f2d3b321b70717f723a61998ab3b9112eec8
SHA512f315d01e8475c4bc73a9c2e18c17c462b826dec66d9900534f0ccddd08f782642828fe1c2b3a04049f82c38f24cd48f419c7d1c91200ca1de32f27642ac145d3
-
C:\Users\Admin\AppData\Local\AdobeFontPack\main.dllFilesize
777KB
MD5926382093a313282f4a1639944f3fb0c
SHA1851380d94deeb031aad806795d760f3982399850
SHA2561ce7c87d8dc79ace14eb2a1be829f2d3b321b70717f723a61998ab3b9112eec8
SHA512f315d01e8475c4bc73a9c2e18c17c462b826dec66d9900534f0ccddd08f782642828fe1c2b3a04049f82c38f24cd48f419c7d1c91200ca1de32f27642ac145d3
-
C:\Users\Admin\AppData\Local\AdobeFontPack\notify.vbsFilesize
68B
MD50308aa2c8dab8a69de41f5d16679bb9b
SHA1c6827bf44a433ff086e787653361859d6f6e2fb3
SHA2560a7e8fd68575db5f84c18b9a26e4058323d1357e2a29a5b12278e4bfa6939489
SHA5121a1ca92e3c8d52c8b5adbb3117a88d8a2a8c33eaf2f7b0d620fe006653f57f4ba0b803884616594ca31e13a1b0b59ddae52cecf044621ec44371084dac6beb72
-
\??\PIPE\wkssvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\AdobeFontPack\main.dllFilesize
777KB
MD5926382093a313282f4a1639944f3fb0c
SHA1851380d94deeb031aad806795d760f3982399850
SHA2561ce7c87d8dc79ace14eb2a1be829f2d3b321b70717f723a61998ab3b9112eec8
SHA512f315d01e8475c4bc73a9c2e18c17c462b826dec66d9900534f0ccddd08f782642828fe1c2b3a04049f82c38f24cd48f419c7d1c91200ca1de32f27642ac145d3
-
\Users\Admin\AppData\Local\AdobeFontPack\main.dllFilesize
777KB
MD5926382093a313282f4a1639944f3fb0c
SHA1851380d94deeb031aad806795d760f3982399850
SHA2561ce7c87d8dc79ace14eb2a1be829f2d3b321b70717f723a61998ab3b9112eec8
SHA512f315d01e8475c4bc73a9c2e18c17c462b826dec66d9900534f0ccddd08f782642828fe1c2b3a04049f82c38f24cd48f419c7d1c91200ca1de32f27642ac145d3
-
memory/540-59-0x0000000000000000-mapping.dmp
-
memory/624-86-0x0000000000000000-mapping.dmp
-
memory/920-58-0x0000000000000000-mapping.dmp
-
memory/944-54-0x000007FEFBF11000-0x000007FEFBF13000-memory.dmpFilesize
8KB
-
memory/1176-79-0x0000000000000000-mapping.dmp
-
memory/1308-80-0x0000000000080000-0x00000000000A2000-memory.dmpFilesize
136KB
-
memory/1308-73-0x0000000000000000-mapping.dmp
-
memory/1308-75-0x00000000748B1000-0x00000000748B3000-memory.dmpFilesize
8KB
-
memory/1308-78-0x0000000000080000-0x00000000000A2000-memory.dmpFilesize
136KB
-
memory/1492-91-0x0000000000E9B000-0x0000000000EBA000-memory.dmpFilesize
124KB
-
memory/1492-84-0x000007FEF3810000-0x000007FEF436D000-memory.dmpFilesize
11.4MB
-
memory/1492-85-0x0000000000E94000-0x0000000000E97000-memory.dmpFilesize
12KB
-
memory/1492-83-0x000007FEF4370000-0x000007FEF4D93000-memory.dmpFilesize
10.1MB
-
memory/1492-89-0x0000000000E94000-0x0000000000E97000-memory.dmpFilesize
12KB
-
memory/1492-81-0x0000000000000000-mapping.dmp
-
memory/1612-66-0x0000000001E90000-0x0000000001F56000-memory.dmpFilesize
792KB
-
memory/1612-64-0x0000000075801000-0x0000000075803000-memory.dmpFilesize
8KB
-
memory/1612-72-0x0000000000150000-0x00000000001D0000-memory.dmpFilesize
512KB
-
memory/1612-71-0x0000000000230000-0x0000000000252000-memory.dmpFilesize
136KB
-
memory/1612-70-0x0000000000150000-0x00000000001D0000-memory.dmpFilesize
512KB
-
memory/1612-68-0x0000000000230000-0x0000000000252000-memory.dmpFilesize
136KB
-
memory/1612-69-0x0000000000230000-0x0000000000252000-memory.dmpFilesize
136KB
-
memory/1612-67-0x0000000000230000-0x0000000000252000-memory.dmpFilesize
136KB
-
memory/1612-63-0x0000000000000000-mapping.dmp
-
memory/1612-77-0x0000000000230000-0x0000000000252000-memory.dmpFilesize
136KB
-
memory/2000-90-0x0000000000000000-mapping.dmp
-
memory/2000-94-0x0000000000670000-0x0000000000736000-memory.dmpFilesize
792KB
-
memory/2000-95-0x00000000007A0000-0x00000000007C2000-memory.dmpFilesize
136KB
-
memory/2000-96-0x00000000007A0000-0x00000000007C2000-memory.dmpFilesize
136KB
-
memory/2000-97-0x00000000007A0000-0x00000000007C2000-memory.dmpFilesize
136KB
-
memory/2000-98-0x0000000000770000-0x0000000000792000-memory.dmpFilesize
136KB
-
memory/2000-99-0x00000000007A0000-0x00000000007C2000-memory.dmpFilesize
136KB