Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 02:58
Static task
static1
Behavioral task
behavioral1
Sample
12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe
Resource
win10v2004-20220812-en
General
-
Target
12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe
-
Size
224KB
-
MD5
dee61e699e48a2b182d58627dc8098ca
-
SHA1
021e253fccf06320a951dc0844509f50bd286b47
-
SHA256
12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
-
SHA512
add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
SSDEEP
3072:WkMlKuJpIOlgpX2tt1a6REPK2TxbFl3JD+VcNezhUs0bRLNmt1:X+9rkpXSkomZT1Pbezx0FLNk
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 39 IoCs
Processes:
taskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exepid process 1696 taskmn32.exe 3592 taskmn32.exe 3500 taskmn32.exe 1212 taskmn32.exe 4856 taskmn32.exe 1192 taskmn32.exe 2712 taskmn32.exe 5020 taskmn32.exe 948 taskmn32.exe 3252 taskmn32.exe 3832 taskmn32.exe 2836 taskmn32.exe 3044 taskmn32.exe 4236 taskmn32.exe 1760 taskmn32.exe 3152 taskmn32.exe 4984 taskmn32.exe 2388 taskmn32.exe 2332 taskmn32.exe 3004 taskmn32.exe 2500 taskmn32.exe 1972 taskmn32.exe 3932 taskmn32.exe 4200 taskmn32.exe 4876 taskmn32.exe 4500 taskmn32.exe 2312 taskmn32.exe 4956 taskmn32.exe 3820 taskmn32.exe 4760 taskmn32.exe 2200 taskmn32.exe 5060 taskmn32.exe 1728 taskmn32.exe 3728 taskmn32.exe 1456 taskmn32.exe 1996 taskmn32.exe 1156 taskmn32.exe 2524 taskmn32.exe 3676 taskmn32.exe -
Processes:
resource yara_rule behavioral2/memory/520-134-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/520-137-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/520-138-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/520-139-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/520-143-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3592-152-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3592-155-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1212-164-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1212-167-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1192-176-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1192-179-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5020-188-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5020-191-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3252-200-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3252-203-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2836-212-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2836-215-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4236-224-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4236-225-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4236-228-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3152-237-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3152-240-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2388-249-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2388-250-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2388-253-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3004-262-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3004-265-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1972-274-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1972-278-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4200-286-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4200-289-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4500-298-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4500-301-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4956-310-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4956-313-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Checks computer location settings 2 TTPs 20 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
taskmn32.exetaskmn32.exetaskmn32.exe12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation taskmn32.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation taskmn32.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation taskmn32.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation taskmn32.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation taskmn32.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation taskmn32.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation taskmn32.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation taskmn32.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation taskmn32.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation taskmn32.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation taskmn32.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation taskmn32.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation taskmn32.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation taskmn32.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation taskmn32.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation taskmn32.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation taskmn32.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation taskmn32.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation taskmn32.exe -
Maps connected drives based on registry 3 TTPs 40 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
taskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exe12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 taskmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum taskmn32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 taskmn32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 taskmn32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 taskmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum taskmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum taskmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum taskmn32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 taskmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum taskmn32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 taskmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum taskmn32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 taskmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 taskmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum taskmn32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 taskmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum taskmn32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 taskmn32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 taskmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum taskmn32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 taskmn32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 taskmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum taskmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum taskmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum taskmn32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 taskmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum taskmn32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 taskmn32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 taskmn32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 taskmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum taskmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum taskmn32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 taskmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum taskmn32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 taskmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum taskmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum taskmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum taskmn32.exe -
Drops file in System32 directory 60 IoCs
Processes:
taskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exe12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File created C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\ taskmn32.exe File opened for modification C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\ taskmn32.exe File opened for modification C:\Windows\SysWOW64\ taskmn32.exe File created C:\Windows\SysWOW64\taskmn32.exe 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe File created C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File created C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File created C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\ taskmn32.exe File created C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\ taskmn32.exe File created C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\ taskmn32.exe File opened for modification C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File created C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\ taskmn32.exe File opened for modification C:\Windows\SysWOW64\ taskmn32.exe File opened for modification C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File created C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File created C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File created C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File created C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\ taskmn32.exe File created C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File created C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\ taskmn32.exe File opened for modification C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\ taskmn32.exe File opened for modification C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\ taskmn32.exe File opened for modification C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\ taskmn32.exe File opened for modification C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\ 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe File created C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File created C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File created C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\ taskmn32.exe File opened for modification C:\Windows\SysWOW64\ taskmn32.exe File opened for modification C:\Windows\SysWOW64\ taskmn32.exe File opened for modification C:\Windows\SysWOW64\ taskmn32.exe File created C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\ taskmn32.exe File opened for modification C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File created C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\taskmn32.exe 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe File opened for modification C:\Windows\SysWOW64\ taskmn32.exe File created C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe -
Suspicious use of SetThreadContext 20 IoCs
Processes:
12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exedescription pid process target process PID 2112 set thread context of 520 2112 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe PID 1696 set thread context of 3592 1696 taskmn32.exe taskmn32.exe PID 3500 set thread context of 1212 3500 taskmn32.exe taskmn32.exe PID 4856 set thread context of 1192 4856 taskmn32.exe taskmn32.exe PID 2712 set thread context of 5020 2712 taskmn32.exe taskmn32.exe PID 948 set thread context of 3252 948 taskmn32.exe taskmn32.exe PID 3832 set thread context of 2836 3832 taskmn32.exe taskmn32.exe PID 3044 set thread context of 4236 3044 taskmn32.exe taskmn32.exe PID 1760 set thread context of 3152 1760 taskmn32.exe taskmn32.exe PID 4984 set thread context of 2388 4984 taskmn32.exe taskmn32.exe PID 2332 set thread context of 3004 2332 taskmn32.exe taskmn32.exe PID 2500 set thread context of 1972 2500 taskmn32.exe taskmn32.exe PID 3932 set thread context of 4200 3932 taskmn32.exe taskmn32.exe PID 4876 set thread context of 4500 4876 taskmn32.exe taskmn32.exe PID 2312 set thread context of 4956 2312 taskmn32.exe taskmn32.exe PID 3820 set thread context of 4760 3820 taskmn32.exe taskmn32.exe PID 2200 set thread context of 5060 2200 taskmn32.exe taskmn32.exe PID 1728 set thread context of 3728 1728 taskmn32.exe taskmn32.exe PID 1456 set thread context of 1996 1456 taskmn32.exe taskmn32.exe PID 1156 set thread context of 2524 1156 taskmn32.exe taskmn32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 20 IoCs
Processes:
taskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exe12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ taskmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ taskmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ taskmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ taskmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ taskmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ taskmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ taskmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ taskmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ taskmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ taskmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ taskmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ taskmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ taskmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ taskmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ taskmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ taskmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ taskmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ taskmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ taskmn32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exepid process 520 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 520 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 520 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 520 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 3592 taskmn32.exe 3592 taskmn32.exe 3592 taskmn32.exe 3592 taskmn32.exe 1212 taskmn32.exe 1212 taskmn32.exe 1212 taskmn32.exe 1212 taskmn32.exe 1192 taskmn32.exe 1192 taskmn32.exe 1192 taskmn32.exe 1192 taskmn32.exe 5020 taskmn32.exe 5020 taskmn32.exe 5020 taskmn32.exe 5020 taskmn32.exe 3252 taskmn32.exe 3252 taskmn32.exe 3252 taskmn32.exe 3252 taskmn32.exe 2836 taskmn32.exe 2836 taskmn32.exe 2836 taskmn32.exe 2836 taskmn32.exe 4236 taskmn32.exe 4236 taskmn32.exe 4236 taskmn32.exe 4236 taskmn32.exe 3152 taskmn32.exe 3152 taskmn32.exe 3152 taskmn32.exe 3152 taskmn32.exe 2388 taskmn32.exe 2388 taskmn32.exe 2388 taskmn32.exe 2388 taskmn32.exe 3004 taskmn32.exe 3004 taskmn32.exe 3004 taskmn32.exe 3004 taskmn32.exe 1972 taskmn32.exe 1972 taskmn32.exe 1972 taskmn32.exe 1972 taskmn32.exe 4200 taskmn32.exe 4200 taskmn32.exe 4200 taskmn32.exe 4200 taskmn32.exe 4500 taskmn32.exe 4500 taskmn32.exe 4500 taskmn32.exe 4500 taskmn32.exe 4956 taskmn32.exe 4956 taskmn32.exe 4956 taskmn32.exe 4956 taskmn32.exe 4760 taskmn32.exe 4760 taskmn32.exe 4760 taskmn32.exe 4760 taskmn32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exetaskmn32.exedescription pid process target process PID 2112 wrote to memory of 520 2112 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe PID 2112 wrote to memory of 520 2112 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe PID 2112 wrote to memory of 520 2112 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe PID 2112 wrote to memory of 520 2112 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe PID 2112 wrote to memory of 520 2112 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe PID 2112 wrote to memory of 520 2112 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe PID 2112 wrote to memory of 520 2112 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe PID 520 wrote to memory of 1696 520 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe taskmn32.exe PID 520 wrote to memory of 1696 520 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe taskmn32.exe PID 520 wrote to memory of 1696 520 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe taskmn32.exe PID 1696 wrote to memory of 3592 1696 taskmn32.exe taskmn32.exe PID 1696 wrote to memory of 3592 1696 taskmn32.exe taskmn32.exe PID 1696 wrote to memory of 3592 1696 taskmn32.exe taskmn32.exe PID 1696 wrote to memory of 3592 1696 taskmn32.exe taskmn32.exe PID 1696 wrote to memory of 3592 1696 taskmn32.exe taskmn32.exe PID 1696 wrote to memory of 3592 1696 taskmn32.exe taskmn32.exe PID 1696 wrote to memory of 3592 1696 taskmn32.exe taskmn32.exe PID 3592 wrote to memory of 3500 3592 taskmn32.exe taskmn32.exe PID 3592 wrote to memory of 3500 3592 taskmn32.exe taskmn32.exe PID 3592 wrote to memory of 3500 3592 taskmn32.exe taskmn32.exe PID 3500 wrote to memory of 1212 3500 taskmn32.exe taskmn32.exe PID 3500 wrote to memory of 1212 3500 taskmn32.exe taskmn32.exe PID 3500 wrote to memory of 1212 3500 taskmn32.exe taskmn32.exe PID 3500 wrote to memory of 1212 3500 taskmn32.exe taskmn32.exe PID 3500 wrote to memory of 1212 3500 taskmn32.exe taskmn32.exe PID 3500 wrote to memory of 1212 3500 taskmn32.exe taskmn32.exe PID 3500 wrote to memory of 1212 3500 taskmn32.exe taskmn32.exe PID 1212 wrote to memory of 4856 1212 taskmn32.exe taskmn32.exe PID 1212 wrote to memory of 4856 1212 taskmn32.exe taskmn32.exe PID 1212 wrote to memory of 4856 1212 taskmn32.exe taskmn32.exe PID 4856 wrote to memory of 1192 4856 taskmn32.exe taskmn32.exe PID 4856 wrote to memory of 1192 4856 taskmn32.exe taskmn32.exe PID 4856 wrote to memory of 1192 4856 taskmn32.exe taskmn32.exe PID 4856 wrote to memory of 1192 4856 taskmn32.exe taskmn32.exe PID 4856 wrote to memory of 1192 4856 taskmn32.exe taskmn32.exe PID 4856 wrote to memory of 1192 4856 taskmn32.exe taskmn32.exe PID 4856 wrote to memory of 1192 4856 taskmn32.exe taskmn32.exe PID 1192 wrote to memory of 2712 1192 taskmn32.exe taskmn32.exe PID 1192 wrote to memory of 2712 1192 taskmn32.exe taskmn32.exe PID 1192 wrote to memory of 2712 1192 taskmn32.exe taskmn32.exe PID 2712 wrote to memory of 5020 2712 taskmn32.exe taskmn32.exe PID 2712 wrote to memory of 5020 2712 taskmn32.exe taskmn32.exe PID 2712 wrote to memory of 5020 2712 taskmn32.exe taskmn32.exe PID 2712 wrote to memory of 5020 2712 taskmn32.exe taskmn32.exe PID 2712 wrote to memory of 5020 2712 taskmn32.exe taskmn32.exe PID 2712 wrote to memory of 5020 2712 taskmn32.exe taskmn32.exe PID 2712 wrote to memory of 5020 2712 taskmn32.exe taskmn32.exe PID 5020 wrote to memory of 948 5020 taskmn32.exe taskmn32.exe PID 5020 wrote to memory of 948 5020 taskmn32.exe taskmn32.exe PID 5020 wrote to memory of 948 5020 taskmn32.exe taskmn32.exe PID 948 wrote to memory of 3252 948 taskmn32.exe taskmn32.exe PID 948 wrote to memory of 3252 948 taskmn32.exe taskmn32.exe PID 948 wrote to memory of 3252 948 taskmn32.exe taskmn32.exe PID 948 wrote to memory of 3252 948 taskmn32.exe taskmn32.exe PID 948 wrote to memory of 3252 948 taskmn32.exe taskmn32.exe PID 948 wrote to memory of 3252 948 taskmn32.exe taskmn32.exe PID 948 wrote to memory of 3252 948 taskmn32.exe taskmn32.exe PID 3252 wrote to memory of 3832 3252 taskmn32.exe taskmn32.exe PID 3252 wrote to memory of 3832 3252 taskmn32.exe taskmn32.exe PID 3252 wrote to memory of 3832 3252 taskmn32.exe taskmn32.exe PID 3832 wrote to memory of 2836 3832 taskmn32.exe taskmn32.exe PID 3832 wrote to memory of 2836 3832 taskmn32.exe taskmn32.exe PID 3832 wrote to memory of 2836 3832 taskmn32.exe taskmn32.exe PID 3832 wrote to memory of 2836 3832 taskmn32.exe taskmn32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe"C:\Users\Admin\AppData\Local\Temp\12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe"C:\Users\Admin\AppData\Local\Temp\12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Users\Admin\AppData\Local\Temp\12C755~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Users\Admin\AppData\Local\Temp\12C755~1.EXE4⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe6⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe8⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe10⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe12⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe14⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2836 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3044 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe16⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4236 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1760 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe18⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3152 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4984 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe20⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2388 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2332 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe22⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3004 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2500 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe24⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1972 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3932 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe26⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4200 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4876 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe28⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4500 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2312 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe30⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4956 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3820 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe32⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4760 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2200 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe34⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:5060 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1728 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe36⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:3728 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1456 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe38⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:1996 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1156 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe40⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:2524 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe41⤵
- Executes dropped EXE
PID:3676
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e