Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
192s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 18:11
Static task
static1
Behavioral task
behavioral1
Sample
3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe
Resource
win10v2004-20220812-en
General
-
Target
3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe
-
Size
1007KB
-
MD5
6d7583b7e4389d2bf68fa6b87acff354
-
SHA1
bbc2c1a129cee26d22ed85fd1ee4b270dd26f96c
-
SHA256
3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418
-
SHA512
8af2e0c42bf7b9f9c2a49d9c6ea638648ec70101f64747d68028b15556d538335c54c34cf7b295b418e12460c1db8a84205957cd0d5551fc5b1ee9f046f9e860
-
SSDEEP
6144:a+nglw9ayQv3ahvyn/PU7O0KXgTTSj2ZYIW7lEykhC6H8GY5RzdhIXbO9qsWbbF2:rjS3Yvyn/0TQIW5EykhXG5RzXsqomsqT
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe smrss.exe" 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe -
Executes dropped EXE 1 IoCs
pid Process 4484 11230.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\WINDOWS\\system32\\svchost.exe" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\freizer = "C:\\WINDOWS\\system32\\freizer.exe" reg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\smrss.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Windows\SysWOW64\smrss.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File created C:\WINDOWS\SysWOW64\freizer.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\pack200.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\policytool.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\xjc.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_pwa_launcher.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\appletviewer.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\native2ascii.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\orbd.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\tnameserv.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\notification_helper.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javah.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\klist.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmid.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\servertool.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\unpack200.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jabswitch.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javap.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jrunscript.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javapackager.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jhat.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java-rmi.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javafxpackager.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jcmd.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmap.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jarsigner.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\kinit.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\idlj.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javadoc.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstack.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\extcheck.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmic.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\wsgen.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javac.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jinfo.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstat.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmc.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jsadebugd.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstatd.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\wsimport.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\7-Zip\7z.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jconsole.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\svchost.exe 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5076 wrote to memory of 4792 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 81 PID 5076 wrote to memory of 4792 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 81 PID 5076 wrote to memory of 4792 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 81 PID 5076 wrote to memory of 3456 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 82 PID 5076 wrote to memory of 3456 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 82 PID 5076 wrote to memory of 3456 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 82 PID 3456 wrote to memory of 3156 3456 cmd.exe 85 PID 3456 wrote to memory of 3156 3456 cmd.exe 85 PID 3456 wrote to memory of 3156 3456 cmd.exe 85 PID 4792 wrote to memory of 4228 4792 cmd.exe 86 PID 4792 wrote to memory of 4228 4792 cmd.exe 86 PID 4792 wrote to memory of 4228 4792 cmd.exe 86 PID 5076 wrote to memory of 4484 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 87 PID 5076 wrote to memory of 4484 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 87 PID 5076 wrote to memory of 4484 5076 3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe"C:\Users\Admin\AppData\Local\Temp\3e84bb06029faec5697fc76d5f36df940a44863de347e7d1cb3591b4ffa5e418.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f3⤵
- Adds Run key to start application
PID:4228
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f3⤵
- Adds Run key to start application
PID:3156
-
-
-
C:\windows\temp\11230.exe"C:\windows\temp\11230.exe"2⤵
- Executes dropped EXE
PID:4484
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD509ae02badc8b2086b93bf9a8e6e571d9
SHA12e11e03477348890d59be465b6ebd57643ba4b2e
SHA256035314fbb4239808456f30f60a6562a911b55e12a1432bdfe7ef33ae5d1748ec
SHA512877380540fd8ea834dab3681d7e4920a56458f20048bffcec092daddaca21933faeadb2ce18f22040b2172279c42aa258d39f56decb2a1497db30aa24eaad224
-
Filesize
90KB
MD509ae02badc8b2086b93bf9a8e6e571d9
SHA12e11e03477348890d59be465b6ebd57643ba4b2e
SHA256035314fbb4239808456f30f60a6562a911b55e12a1432bdfe7ef33ae5d1748ec
SHA512877380540fd8ea834dab3681d7e4920a56458f20048bffcec092daddaca21933faeadb2ce18f22040b2172279c42aa258d39f56decb2a1497db30aa24eaad224