Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
169s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe
Resource
win10v2004-20220812-en
General
-
Target
bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe
-
Size
24KB
-
MD5
9accd4a9dac87a5c2961fa42ae39fe35
-
SHA1
ceb3e9458c54f3a1fa8cebb9394a2d83b77aff58
-
SHA256
bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48
-
SHA512
67251e77ebff7eaa21264948b78d84333b5ce667115532689ab6a31eee9b627ba89c0f7c369749480f52bcb9b32c98494de93ed73db1ea6f3c1e42adae0a0358
-
SSDEEP
768:13O6TnoCMwfFdFm6l4A2N3rSVBaOnFKXJQuW6v5r4M1xue:VzofoFdH3sS6xXOli5B
Malware Config
Signatures
-
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ravservice.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonxp.KXP bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Navapsvc.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcshield.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360sd.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360sd.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\krnl360svc.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Mmsk.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIARP.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\naPrdMgr.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojanDetector.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safe.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPC32.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavStub.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RsMain.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwsrv.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccEvtMgr.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safeup.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Runiep.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPC32.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVPFW.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Trojanwall.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\arpfw.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safebox.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Frameworkservice.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kwatch.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PFW.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safeup.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIARP.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAV.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rsaupd.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ArSwp.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMon.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IceSword.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nod32kui.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safeboxTray.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMon.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kav32.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kav32.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcshield.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZhuDongFangYu.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safe.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRegEx.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavStub.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kissvc.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVWSC.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KpfwSvc.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ast.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavstart.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GuardField.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojDie.KXP\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvMonitor.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAVTRAY.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVSrvXP.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVPFW.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KSWebShield.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ArSwp.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\LiveUpdate360.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe -
Loads dropped DLL 1 IoCs
pid Process 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\dllcache\linkinfo.dll bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\fonts\niuxs.sys bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe File created C:\Windows\fonts\fuckjss.sys bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1756 sc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 468 Process not Found 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Token: SeDebugPrivilege 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2012 wrote to memory of 944 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 28 PID 2012 wrote to memory of 944 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 28 PID 2012 wrote to memory of 944 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 28 PID 2012 wrote to memory of 944 2012 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 28 PID 944 wrote to memory of 1756 944 cmd.exe 30 PID 944 wrote to memory of 1756 944 cmd.exe 30 PID 944 wrote to memory of 1756 944 cmd.exe 30 PID 944 wrote to memory of 1756 944 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe"C:\Users\Admin\AppData\Local\Temp\bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe"1⤵
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\cmd.execmd /c sc config avp start= disabled2⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\sc.exesc config avp start= disabled3⤵
- Launches sc.exe
PID:1756
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5c478c5775d51d8d87e33fb9fba56950b
SHA116e339c48b0f3c573f73682f3d16819e6776578c
SHA256c923b1d74f2676100b941c09098443f492186d658ba1eb2a57d14fa53b10b02e
SHA512a4b9aa5192d09b1a1e9e4fc1a20e1035c0c4416033d22aded2f289c583e8df592e5ea759b5077e70c15ef51c6b4b7a9cfb048ac79cabf66b8e76e0883d61f51e