Analysis
-
max time kernel
41s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01-10-2022 18:11
Static task
static1
Behavioral task
behavioral1
Sample
3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe
Resource
win10v2004-20220812-en
General
-
Target
3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe
-
Size
1007KB
-
MD5
6d7583b7e4389d2bf68fa6b87acff354
-
SHA1
bbc2c1a129cee26d22ed85fd1ee4b270dd26f96c
-
SHA256
3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418
-
SHA512
8af2e0c42bf7b9f9c2a49d9c6ea638648ec70101f64747d68028b15556d538335c54c34cf7b295b418e12460c1db8a84205957cd0d5551fc5b1ee9f046f9e860
-
SSDEEP
6144:a+nglw9ayQv3ahvyn/PU7O0KXgTTSj2ZYIW7lEykhC6H8GY5RzdhIXbO9qsWbbF2:rjS3Yvyn/0TQIW5EykhXG5RzXsqomsqT
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe smrss.exe" 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe -
Executes dropped EXE 1 IoCs
pid Process 1772 11230.exe -
Loads dropped DLL 1 IoCs
pid Process 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\freizer = "C:\\WINDOWS\\system32\\freizer.exe" reg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\WINDOWS\\system32\\svchost.exe" reg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\smrss.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File created C:\WINDOWS\SysWOW64\freizer.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File created C:\Windows\SysWOW64\smrss.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Windows Media Player\wmlaunch.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateBroker.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleCrashHandler64.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\notification_helper.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateSetup.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_pwa_launcher.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLED.EXE 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleCrashHandler.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateComRegisterShell64.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DW20.EXE 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Windows Media Player\wmpconfig.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Windows Media Player\wmplayer.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOICONS.EXE 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\svchost.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2024 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 27 PID 2028 wrote to memory of 2024 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 27 PID 2028 wrote to memory of 2024 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 27 PID 2028 wrote to memory of 2024 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 27 PID 2028 wrote to memory of 992 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 28 PID 2028 wrote to memory of 992 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 28 PID 2028 wrote to memory of 992 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 28 PID 2028 wrote to memory of 992 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 28 PID 992 wrote to memory of 580 992 cmd.exe 32 PID 992 wrote to memory of 580 992 cmd.exe 32 PID 992 wrote to memory of 580 992 cmd.exe 32 PID 992 wrote to memory of 580 992 cmd.exe 32 PID 2024 wrote to memory of 804 2024 cmd.exe 31 PID 2024 wrote to memory of 804 2024 cmd.exe 31 PID 2024 wrote to memory of 804 2024 cmd.exe 31 PID 2024 wrote to memory of 804 2024 cmd.exe 31 PID 2028 wrote to memory of 1772 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 33 PID 2028 wrote to memory of 1772 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 33 PID 2028 wrote to memory of 1772 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 33 PID 2028 wrote to memory of 1772 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 33 PID 2028 wrote to memory of 1772 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 33 PID 2028 wrote to memory of 1772 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 33 PID 2028 wrote to memory of 1772 2028 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe"C:\Users\Admin\AppData\Local\Temp\3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f3⤵
- Adds Run key to start application
PID:804
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f3⤵
- Adds Run key to start application
PID:580
-
-
-
C:\windows\temp\11230.exe"C:\windows\temp\11230.exe"2⤵
- Executes dropped EXE
PID:1772
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD509ae02badc8b2086b93bf9a8e6e571d9
SHA12e11e03477348890d59be465b6ebd57643ba4b2e
SHA256035314fbb4239808456f30f60a6562a911b55e12a1432bdfe7ef33ae5d1748ec
SHA512877380540fd8ea834dab3681d7e4920a56458f20048bffcec092daddaca21933faeadb2ce18f22040b2172279c42aa258d39f56decb2a1497db30aa24eaad224
-
Filesize
90KB
MD509ae02badc8b2086b93bf9a8e6e571d9
SHA12e11e03477348890d59be465b6ebd57643ba4b2e
SHA256035314fbb4239808456f30f60a6562a911b55e12a1432bdfe7ef33ae5d1748ec
SHA512877380540fd8ea834dab3681d7e4920a56458f20048bffcec092daddaca21933faeadb2ce18f22040b2172279c42aa258d39f56decb2a1497db30aa24eaad224