Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe
Resource
win10v2004-20220812-en
General
-
Target
bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe
-
Size
24KB
-
MD5
9accd4a9dac87a5c2961fa42ae39fe35
-
SHA1
ceb3e9458c54f3a1fa8cebb9394a2d83b77aff58
-
SHA256
bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48
-
SHA512
67251e77ebff7eaa21264948b78d84333b5ce667115532689ab6a31eee9b627ba89c0f7c369749480f52bcb9b32c98494de93ed73db1ea6f3c1e42adae0a0358
-
SSDEEP
768:13O6TnoCMwfFdFm6l4A2N3rSVBaOnFKXJQuW6v5r4M1xue:VzofoFdH3sS6xXOli5B
Malware Config
Signatures
-
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMon.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRegEx.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rsaupd.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcshield.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safebox.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIARP.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KSWebShield.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rp.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safebox.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMonD.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAV.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GFUpd.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ScanFrm.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RsAgent.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AutoRun.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVSrvXP.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32krn.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SREngLdr.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KpfwSvc.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\LiveUpdate360.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAVTRAY.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IceSword.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVWSC.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwstub.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PFW.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kav32.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RSTray.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safeboxTray.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\LiveUpdate360.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvMonitor.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavstart.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavStub.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwsrv.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360sd.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMon.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavstart.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Trojanwall.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojDie.KXP bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PFW.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccEvtMgr.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kwatch.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVWSC.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Frameworkservice.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAVTRAY.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavTask.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ast.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIARP.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kwatch.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojanDetector.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safeup.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\krnl360svc.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nod32kui.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Mmsk.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WOPTILITIES.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAV.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ArSwp.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\naPrdMgr.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rp.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safe.EXE bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVPFW.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Runiep.EXE\debugger = "ntsd -d" bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe -
Loads dropped DLL 1 IoCs
pid Process 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\dllcache\linkinfo.dll bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\fonts\niuxs.sys bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe File created C:\Windows\fonts\fuckjss.sys bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5000 sc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 648 Process not Found 648 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe Token: SeDebugPrivilege 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3968 wrote to memory of 3032 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 80 PID 3968 wrote to memory of 3032 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 80 PID 3968 wrote to memory of 3032 3968 bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe 80 PID 3032 wrote to memory of 5000 3032 cmd.exe 82 PID 3032 wrote to memory of 5000 3032 cmd.exe 82 PID 3032 wrote to memory of 5000 3032 cmd.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe"C:\Users\Admin\AppData\Local\Temp\bdadaa872c254662811e096454ec3860b97aac44d1a8054bb24faad647563a48.exe"1⤵
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\cmd.execmd /c sc config avp start= disabled2⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\sc.exesc config avp start= disabled3⤵
- Launches sc.exe
PID:5000
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD534416d6428b8760feb743871dd046e36
SHA113527f65c27f35d6f52dd57694a787cf88e574cf
SHA2564d5416872bbe989eda9b06ff88058f039ee1eac78874e44a3cef698aa48cf5c6
SHA51216e7574582e2c8002e39b8be9efa95540b869f0f9a0303d2374a22b01c687a1c10f27841d4d79bda94fa7a4988feb2c2036db290f15e339dfbee78950d4b1996