Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2022 18:12
Static task
static1
Behavioral task
behavioral1
Sample
288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe
Resource
win10v2004-20220901-en
General
-
Target
288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe
-
Size
1011KB
-
MD5
6e634020ae3ab6fd8434b2b387b8c56b
-
SHA1
2cd0a0ea86c236e0d742703a2868604d1cb156c4
-
SHA256
288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911
-
SHA512
1c7380d4172322ca802008180de894501d7a6beadd03727218d9656990cae08263fe38fde90b2bdd347f4066d40c025a071550bb0cf58dbacdc95b39f57b9372
-
SSDEEP
12288:rjS3Yvyn/0TQIW5EykhXG5RzXsqolsqlew:ru3Y5EE05d1ol1lew
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe smrss.exe" 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe -
Executes dropped EXE 1 IoCs
pid Process 740 34133.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\freizer = "C:\\WINDOWS\\system32\\freizer.exe" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\WINDOWS\\system32\\svchost.exe" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\smrss.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Windows\SysWOW64\smrss.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File created C:\WINDOWS\SysWOW64\freizer.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jarsigner.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstat.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\serialver.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0409-1000-0000000FF1CE}\misc.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\extcheck.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\klist.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\CLVIEW.EXE 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jdeps.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate64.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelper.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\DATABASECOMPARE.EXE 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\servertool.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\pack200.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelperBgt.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-hang-ui.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java-rmi.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstack.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\pj11icon.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSQRY32.EXE 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javap.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jabswitch.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\java-rmi.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\unpack200.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\joticon.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\unpack200.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\orbd.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVLP.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\ssvagent.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOUC.EXE 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\VPREVIEW.EXE 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Windows Media Player\wmpconfig.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\policytool.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\wsgen.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOICONS.EXE 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SELFCERT.EXE 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmiregistry.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\schemagen.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\rmiregistry.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\tnameserv.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\svchost.exe 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 740 34133.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2128 wrote to memory of 5040 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 82 PID 2128 wrote to memory of 5040 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 82 PID 2128 wrote to memory of 5040 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 82 PID 2128 wrote to memory of 5052 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 83 PID 2128 wrote to memory of 5052 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 83 PID 2128 wrote to memory of 5052 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 83 PID 5052 wrote to memory of 1696 5052 cmd.exe 87 PID 5052 wrote to memory of 1696 5052 cmd.exe 87 PID 5052 wrote to memory of 1696 5052 cmd.exe 87 PID 5040 wrote to memory of 2444 5040 cmd.exe 86 PID 5040 wrote to memory of 2444 5040 cmd.exe 86 PID 5040 wrote to memory of 2444 5040 cmd.exe 86 PID 2128 wrote to memory of 740 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 89 PID 2128 wrote to memory of 740 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 89 PID 2128 wrote to memory of 740 2128 288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe"C:\Users\Admin\AppData\Local\Temp\288f6789c66e919dc29b90edfaac00a3a055d5a8ab5a54876773cc2fff62c911.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f3⤵
- Adds Run key to start application
PID:2444
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f3⤵
- Adds Run key to start application
PID:1696
-
-
-
C:\windows\temp\34133.exe"C:\windows\temp\34133.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:740
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD54d3d7de2365df210da13a5b2a524817d
SHA185ce60c4604e92e9a87891dc3cf1530a9056f505
SHA256a4bd4c37b948c965242a2e053fc4fc05ffee26f54a56199f39d551eee118b19e
SHA512d9b2f7bfeb85983e1092773e5d06bf035bdaf3296ec930e86f6d4c2365a9f3c6ef06462c0e99f113a9f3b2f3e6b8a66bf0f2573374c3965fc335ff29d7ea498a
-
Filesize
24KB
MD54d3d7de2365df210da13a5b2a524817d
SHA185ce60c4604e92e9a87891dc3cf1530a9056f505
SHA256a4bd4c37b948c965242a2e053fc4fc05ffee26f54a56199f39d551eee118b19e
SHA512d9b2f7bfeb85983e1092773e5d06bf035bdaf3296ec930e86f6d4c2365a9f3c6ef06462c0e99f113a9f3b2f3e6b8a66bf0f2573374c3965fc335ff29d7ea498a