Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 18:06
Static task
static1
Behavioral task
behavioral1
Sample
83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe
Resource
win7-20220901-en
General
-
Target
83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe
-
Size
613KB
-
MD5
61499478b9349400960eed4f38fe8d81
-
SHA1
68db254441714cd70cb9f97b7eea2b7ad3ee4d24
-
SHA256
83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7
-
SHA512
289384e4a8ff49a17d0e97add2eed7ae859d67ac6d8cb8819c4f4f0b5c49dd3eb6d7069080abe9ff9160a4beb8936b0e2ebf95d0c0a9cccfaea331be92018c2b
-
SSDEEP
12288:Y5FXC1Hxfob9fzzQEmm9RNQBeAKcdIxIQsW8+AIWH2:Y5FeHxfob9fHQE57GE1XA
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 4636 elevation_service.exe 4492 elevation_service.exe 4104 maintenanceservice.exe 632 OSE.EXE 4128 ssh-agent.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\dlddmedljhmbgdhapibnagaanenmajcm\1.0_0\manifest.json 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened (read-only) \??\M: 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened (read-only) \??\P: 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened (read-only) \??\R: 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened (read-only) \??\U: 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened (read-only) \??\V: 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened (read-only) \??\X: 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened (read-only) \??\E: 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened (read-only) \??\F: 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened (read-only) \??\L: 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened (read-only) \??\O: 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened (read-only) \??\S: 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened (read-only) \??\Q: 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened (read-only) \??\T: 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened (read-only) \??\W: 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened (read-only) \??\G: 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened (read-only) \??\H: 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened (read-only) \??\I: 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened (read-only) \??\K: 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened (read-only) \??\N: 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened (read-only) \??\Y: 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened (read-only) \??\Z: 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe -
Drops file in System32 directory 61 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\sgrmbroker.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\spectrum.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\perceptionsimulation\perceptionsimulationservice.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\snmptrap.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\Agentservice.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created \??\c:\windows\SysWOW64\msiexec.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\vssvc.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\wbengine.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\dllhost.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created \??\c:\windows\system32\Agentservice.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\msiexec.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created \??\c:\windows\system32\fxssvc.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created \??\c:\windows\system32\msdtc.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\vds.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\wbengine.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\searchindexer.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\dllhost.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created \??\c:\windows\system32\Appvclient.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\diagsvcs\diagnosticshub.standardcollector.service.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created \??\c:\windows\system32\msiexec.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created \??\c:\windows\system32\openssh\ssh-agent.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\alg.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\vssvc.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\Appvclient.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\fxssvc.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\msiexec.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\locator.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\openssh\ssh-agent.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created \??\c:\windows\system32\wbengine.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\lsass.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\svchost.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\WindowsPowerShell\v1.0\powershell.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\vds.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\tieringengineservice.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\spectrum.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\msdtc.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\perfhost.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created \??\c:\windows\system32\snmptrap.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\Agentservice.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created \??\c:\windows\system32\WindowsPowerShell\v1.0\powershell.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\sensordataservice.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\windows\system32\Appvclient.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\policytool.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaws.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\jp2launcher.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\servertool.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created C:\Program Files\Internet Explorer\ielowutil.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javapackager.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\kinit.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\notification_helper.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javadoc.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\unpack200.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created C:\Program Files\7-Zip\7zG.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\kinit.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\orbd.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java-rmi.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\keytool.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jhat.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\7-Zip\7z.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jar.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created C:\Program Files\Internet Explorer\iexplore.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jps.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javafxpackager.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstat.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\orbd.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\servertool.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmap.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaws.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification \??\c:\program files\google\chrome\Application\89.0.4389.114\elevation_service.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jcmd.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_pwa_launcher.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\ktab.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created C:\Program Files\7-Zip\7z.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created C:\Program Files\7-Zip\7zFM.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jvisualvm.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created C:\Program Files\Common Files\microsoft shared\ink\mip.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\appletviewer.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\policytool.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmid.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\pack200.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created C:\Program Files\Internet Explorer\ExtExport.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jabswitch.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created \??\c:\program files\common files\microsoft shared\source engine\ose.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\msedge.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaws.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\extcheck.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstatd.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created C:\Program Files\Common Files\microsoft shared\ink\TabTip.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.vir 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 1800 4636 WerFault.exe 86 1192 4492 WerFault.exe 87 4716 632 WerFault.exe 89 4400 4128 WerFault.exe 90 -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 672 Process not Found 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1848 83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe"C:\Users\Admin\AppData\Local\Temp\83c5bfda45d9f36fdfc3f4fa6b0ef3c1512f0d613e19508fb29193dd3a25eae7.exe"1⤵
- Drops Chrome extension
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4636 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4636 -s 5802⤵
- Program crash
PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4492 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4492 -s 4922⤵
- Program crash
PID:1192
-
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4104
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:632 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 632 -s 2842⤵
- Program crash
PID:4716
-
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:4128 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4128 -s 3522⤵
- Program crash
PID:4400
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 476 -p 4636 -ip 46361⤵PID:4396
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 484 -p 4492 -ip 44921⤵PID:4140
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 516 -p 632 -ip 6321⤵PID:3516
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 572 -p 4128 -ip 41281⤵PID:4724
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5e431ab1ef9f171ef2479b14843c06771
SHA1ada06efe16e92a3a673a7ce17f8ea1e52894af4d
SHA25684ca7fb587f69cb9e17dc291c0bd1238b5f7869b804e1b6877975064aed780ff
SHA5120aa613c178bcc1f1d36d447bf2a741f0b058019e2e80940bcf5d653d5197fa2aec0654ac1eaf790d7b970950afff2074a8f6007af3d4034e3a423aee9b9ed769
-
Filesize
726KB
MD55e671a72145deda66484794d7ddf53ee
SHA1df16def83d80984a64a80b34e5c3f360d5a505dc
SHA256ad225d7ba6230d6e7a136f1013fb52d5a183fd4213e741295fcf8190c3724eda
SHA51210f559a520ba8ecfd4033394be6cc14f5f9d8856afda66e461b611eb3f1c356ab14263bf64ae2275ed2e88e52c7e1c8bb1a6a6093fbfa7e55b058da70c9e6c49
-
Filesize
736KB
MD5482210a0efcf396c381eda2b5ee8e430
SHA164a9868b86d9fc9f3f445e15cb4c1ada8e468072
SHA2565d959e7c93645ffebb4937a8f566a0149e4ea6a7b0f9739058d044542f450f42
SHA512871964db8d281cdd5774efc9aae5c1ee8a87c2a7507e907718574a3d1fb2957f5429e56bef444b115028985d3120de2c6420ab893d09ad25b7f1127d5baf6830
-
Filesize
1.9MB
MD57418713080a502ab9086cf9779d45574
SHA1b7c92c9c637e4d5ad00a23cf1525a06809baef31
SHA256c3ce6ed877add26f2ce945eb2879240cec38bf4f820aa462d6cabe9ae5f19b4b
SHA5120ac8ef58fad78adce96cc2b65cdc92de7ff876e90caf0fc4098f249e8db887fffa310076440ac9f0f1c47cb7b2394e4c2f0de6bd7a744ec469851422893ed9cb
-
Filesize
870KB
MD53db35a4709ffff3ccccc36c5ac4b3fae
SHA15425a665ee6628cca2ce079d567a4e450bb5ccd9
SHA25603de62c68488d3919920b9f207e27bd7ea702a2379ed86be2aca7e09fa7050d9
SHA512c1fcf6151360be81aa26c051e6a7d923173f7c03ee05fac68e03532b272743dd103ccdad6dc78bd468e159617ca1ee73fda767602efaf959f944349118d5635d
-
Filesize
870KB
MD53db35a4709ffff3ccccc36c5ac4b3fae
SHA15425a665ee6628cca2ce079d567a4e450bb5ccd9
SHA25603de62c68488d3919920b9f207e27bd7ea702a2379ed86be2aca7e09fa7050d9
SHA512c1fcf6151360be81aa26c051e6a7d923173f7c03ee05fac68e03532b272743dd103ccdad6dc78bd468e159617ca1ee73fda767602efaf959f944349118d5635d