Analysis
-
max time kernel
91s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01/10/2022, 18:12
Static task
static1
Behavioral task
behavioral1
Sample
288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe
Resource
win10v2004-20220901-en
General
-
Target
288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe
-
Size
1011KB
-
MD5
6e634020ae3ab6fd8434b2b387b8c56b
-
SHA1
2cd0a0ea86c236e0d742703a2868604d1cb156c4
-
SHA256
288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911
-
SHA512
1c7380d4172322ca802008180de894501d7a6beadd03727218d9656990cae08263fe38fde90b2bdd347f4066d40c025a071550bb0cf58dbacdc95b39f57b9372
-
SSDEEP
12288:rjS3Yvyn/0TQIW5EykhXG5RzXsqolsqlew:ru3Y5EE05d1ol1lew
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe smrss.exe" 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe -
Executes dropped EXE 1 IoCs
pid Process 1732 34133.exe -
Loads dropped DLL 2 IoCs
pid Process 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\WINDOWS\\system32\\svchost.exe" reg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\freizer = "C:\\WINDOWS\\system32\\freizer.exe" reg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\freizer.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File created C:\Windows\SysWOW64\smrss.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Windows\SysWOW64\smrss.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Windows Media Player\wmpnscfg.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateOnDemand.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\LICLUA.EXE 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\vsta_ep32.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Setup.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Windows Journal\Journal.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Windows Media Player\WMPSideShowGadget.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Windows Media Player\wmpconfig.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\airappinstaller.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\SmartTagInstall.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Windows Media Player\wmplayer.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleCrashHandler.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateSetup.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\svchost.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1732 34133.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1304 wrote to memory of 1288 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 27 PID 1304 wrote to memory of 1288 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 27 PID 1304 wrote to memory of 1288 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 27 PID 1304 wrote to memory of 1288 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 27 PID 1304 wrote to memory of 944 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 29 PID 1304 wrote to memory of 944 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 29 PID 1304 wrote to memory of 944 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 29 PID 1304 wrote to memory of 944 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 29 PID 1288 wrote to memory of 1300 1288 cmd.exe 32 PID 1288 wrote to memory of 1300 1288 cmd.exe 32 PID 1288 wrote to memory of 1300 1288 cmd.exe 32 PID 1288 wrote to memory of 1300 1288 cmd.exe 32 PID 944 wrote to memory of 268 944 cmd.exe 31 PID 944 wrote to memory of 268 944 cmd.exe 31 PID 944 wrote to memory of 268 944 cmd.exe 31 PID 944 wrote to memory of 268 944 cmd.exe 31 PID 1304 wrote to memory of 1732 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 33 PID 1304 wrote to memory of 1732 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 33 PID 1304 wrote to memory of 1732 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 33 PID 1304 wrote to memory of 1732 1304 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe"C:\Users\Admin\AppData\Local\Temp\288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f3⤵
- Adds Run key to start application
PID:1300
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f3⤵
- Adds Run key to start application
PID:268
-
-
-
C:\windows\temp\34133.exe"C:\windows\temp\34133.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1732
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD54d3d7de2365df210da13a5b2a524817d
SHA185ce60c4604e92e9a87891dc3cf1530a9056f505
SHA256a4bd4c37b948c965242a2e053fc4fc05ffee26f54a56199f39d551eee118b19e
SHA512d9b2f7bfeb85983e1092773e5d06bf035bdaf3296ec930e86f6d4c2365a9f3c6ef06462c0e99f113a9f3b2f3e6b8a66bf0f2573374c3965fc335ff29d7ea498a
-
Filesize
24KB
MD54d3d7de2365df210da13a5b2a524817d
SHA185ce60c4604e92e9a87891dc3cf1530a9056f505
SHA256a4bd4c37b948c965242a2e053fc4fc05ffee26f54a56199f39d551eee118b19e
SHA512d9b2f7bfeb85983e1092773e5d06bf035bdaf3296ec930e86f6d4c2365a9f3c6ef06462c0e99f113a9f3b2f3e6b8a66bf0f2573374c3965fc335ff29d7ea498a
-
Filesize
24KB
MD54d3d7de2365df210da13a5b2a524817d
SHA185ce60c4604e92e9a87891dc3cf1530a9056f505
SHA256a4bd4c37b948c965242a2e053fc4fc05ffee26f54a56199f39d551eee118b19e
SHA512d9b2f7bfeb85983e1092773e5d06bf035bdaf3296ec930e86f6d4c2365a9f3c6ef06462c0e99f113a9f3b2f3e6b8a66bf0f2573374c3965fc335ff29d7ea498a