Analysis
-
max time kernel
153s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 07:59
Static task
static1
Behavioral task
behavioral1
Sample
c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe
Resource
win10v2004-20220812-en
General
-
Target
c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe
-
Size
456KB
-
MD5
7143265016682a10442c7455007dd922
-
SHA1
cf412f69d2afdc4c04c128eda90eca7e45c7cc71
-
SHA256
c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b
-
SHA512
c468b8a622d69ecd3d455d5a376412583ff3d8296140b8434f9f3d5cb24161dc1467df8b4e290eb3023327ea1ad869e39e085d6e20587d4079b2e161a30818fc
-
SSDEEP
12288:jEVXKpmokXif4JgTIoq43H2cE05nMx11DGkfb7i:jEtR/iAJgMe3H2cJCx1YOb7i
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" iAsD8zgo9sJlU4T4lK.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qeucei.exe -
Executes dropped EXE 6 IoCs
pid Process 1764 iAsD8zgo9sJlU4T4lK.exe 2040 qeucei.exe 1328 txhost.exe 760 uxhost.exe 1532 txhost.exe 580 vxhost.exe -
Loads dropped DLL 10 IoCs
pid Process 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 1764 iAsD8zgo9sJlU4T4lK.exe 1764 iAsD8zgo9sJlU4T4lK.exe 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /s" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /O" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /V" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /o" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /q" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /j" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /Q" qeucei.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ iAsD8zgo9sJlU4T4lK.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /E" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /G" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /r" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /L" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /w" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /W" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /A" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /B" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /P" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /J" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /K" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /M" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /l" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /x" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /n" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /t" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /h" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /d" iAsD8zgo9sJlU4T4lK.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /U" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /c" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /f" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /R" qeucei.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /D" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /N" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /b" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /H" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /m" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /y" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /X" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /I" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /d" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /k" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /a" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /u" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /C" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /Z" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /v" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /F" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /p" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /Y" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /z" qeucei.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeucei = "C:\\Users\\Admin\\qeucei.exe /T" qeucei.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 uxhost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1904 set thread context of 2044 1904 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 28 PID 1328 set thread context of 1532 1328 txhost.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 336 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1764 iAsD8zgo9sJlU4T4lK.exe 1764 iAsD8zgo9sJlU4T4lK.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe 2040 qeucei.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 336 tasklist.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 1764 iAsD8zgo9sJlU4T4lK.exe 2040 qeucei.exe 580 vxhost.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2044 1904 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 28 PID 1904 wrote to memory of 2044 1904 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 28 PID 1904 wrote to memory of 2044 1904 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 28 PID 1904 wrote to memory of 2044 1904 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 28 PID 1904 wrote to memory of 2044 1904 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 28 PID 1904 wrote to memory of 2044 1904 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 28 PID 1904 wrote to memory of 2044 1904 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 28 PID 1904 wrote to memory of 2044 1904 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 28 PID 1904 wrote to memory of 2044 1904 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 28 PID 2044 wrote to memory of 1764 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 29 PID 2044 wrote to memory of 1764 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 29 PID 2044 wrote to memory of 1764 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 29 PID 2044 wrote to memory of 1764 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 29 PID 1764 wrote to memory of 2040 1764 iAsD8zgo9sJlU4T4lK.exe 30 PID 1764 wrote to memory of 2040 1764 iAsD8zgo9sJlU4T4lK.exe 30 PID 1764 wrote to memory of 2040 1764 iAsD8zgo9sJlU4T4lK.exe 30 PID 1764 wrote to memory of 2040 1764 iAsD8zgo9sJlU4T4lK.exe 30 PID 1764 wrote to memory of 472 1764 iAsD8zgo9sJlU4T4lK.exe 31 PID 1764 wrote to memory of 472 1764 iAsD8zgo9sJlU4T4lK.exe 31 PID 1764 wrote to memory of 472 1764 iAsD8zgo9sJlU4T4lK.exe 31 PID 1764 wrote to memory of 472 1764 iAsD8zgo9sJlU4T4lK.exe 31 PID 472 wrote to memory of 336 472 cmd.exe 33 PID 472 wrote to memory of 336 472 cmd.exe 33 PID 472 wrote to memory of 336 472 cmd.exe 33 PID 472 wrote to memory of 336 472 cmd.exe 33 PID 2044 wrote to memory of 1328 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 35 PID 2044 wrote to memory of 1328 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 35 PID 2044 wrote to memory of 1328 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 35 PID 2044 wrote to memory of 1328 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 35 PID 2044 wrote to memory of 760 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 36 PID 2044 wrote to memory of 760 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 36 PID 2044 wrote to memory of 760 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 36 PID 2044 wrote to memory of 760 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 36 PID 1328 wrote to memory of 1532 1328 txhost.exe 37 PID 1328 wrote to memory of 1532 1328 txhost.exe 37 PID 1328 wrote to memory of 1532 1328 txhost.exe 37 PID 1328 wrote to memory of 1532 1328 txhost.exe 37 PID 1328 wrote to memory of 1532 1328 txhost.exe 37 PID 1328 wrote to memory of 1532 1328 txhost.exe 37 PID 1328 wrote to memory of 1532 1328 txhost.exe 37 PID 1328 wrote to memory of 1532 1328 txhost.exe 37 PID 1328 wrote to memory of 1532 1328 txhost.exe 37 PID 1328 wrote to memory of 1532 1328 txhost.exe 37 PID 1328 wrote to memory of 1532 1328 txhost.exe 37 PID 2044 wrote to memory of 580 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 38 PID 2044 wrote to memory of 580 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 38 PID 2044 wrote to memory of 580 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 38 PID 2044 wrote to memory of 580 2044 c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe"C:\Users\Admin\AppData\Local\Temp\c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\c852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exec852bb48bd76378b6e827e8251e52b83274d70ee5c7c227b0b0e0ba3b274816b.exe2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\iAsD8zgo9sJlU4T4lK.exeC:\Users\Admin\iAsD8zgo9sJlU4T4lK.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\qeucei.exe"C:\Users\Admin\qeucei.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2040
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del iAsD8zgo9sJlU4T4lK.exe4⤵
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-
-
-
C:\Users\Admin\txhost.exeC:\Users\Admin\txhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\txhost.exetxhost.exe4⤵
- Executes dropped EXE
PID:1532
-
-
-
C:\Users\Admin\uxhost.exeC:\Users\Admin\uxhost.exe3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:760
-
-
C:\Users\Admin\vxhost.exeC:\Users\Admin\vxhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:580
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD5c1ca4a842399156d6ce56df9fe167158
SHA1c24482b800d11e8f0238df3d950b745f38c245e7
SHA256197d8be66fca12a1c137e920a49610b38f29756c7b7473ec1962c6499918f15a
SHA512a89f3170db1de6f296b12c42059495821ef6e9b03a8e3e58aafcfa5cfab8cc0f996e5498476f638a80f604a2c2d6b7d626bd621b35b0c4502b6916aa1380e1c9
-
Filesize
156KB
MD5c1ca4a842399156d6ce56df9fe167158
SHA1c24482b800d11e8f0238df3d950b745f38c245e7
SHA256197d8be66fca12a1c137e920a49610b38f29756c7b7473ec1962c6499918f15a
SHA512a89f3170db1de6f296b12c42059495821ef6e9b03a8e3e58aafcfa5cfab8cc0f996e5498476f638a80f604a2c2d6b7d626bd621b35b0c4502b6916aa1380e1c9
-
Filesize
156KB
MD5181f22855f833b2d0f633f1c4efcfc76
SHA1a225cb04ff1c704779f02be2ed847b6fe3bcc594
SHA2563a03fd1047afb37b0e72e4da74ab70bf5e7fb80193ea7099b06fe37c42d867bf
SHA512b37e3443ebd2dad2d7adadfddc7c73724f2a32476debfdcc779ed039f69ec965729cab15a37dc37c499a9b12c0b782c12468164faf9004f0c10322072e2c31d1
-
Filesize
156KB
MD5181f22855f833b2d0f633f1c4efcfc76
SHA1a225cb04ff1c704779f02be2ed847b6fe3bcc594
SHA2563a03fd1047afb37b0e72e4da74ab70bf5e7fb80193ea7099b06fe37c42d867bf
SHA512b37e3443ebd2dad2d7adadfddc7c73724f2a32476debfdcc779ed039f69ec965729cab15a37dc37c499a9b12c0b782c12468164faf9004f0c10322072e2c31d1
-
Filesize
146KB
MD518c83c689100e66caedb1c76ed87bd95
SHA1901c0f6c4757d37d5a2e357704344aeb31a9cadb
SHA25637d78483538af016b7646678df08893badea86d7b5f4317b99393bbcd3c172b9
SHA512e87c6aeaa1cc7a69f390c57d4cbcc1efa3cb5349a445831f822f7843b3a3d850f9793818d4e1e7fe011a5af0e99bbdb7cf8a5ec13541dedb8431fc47ef9f33b1
-
Filesize
146KB
MD518c83c689100e66caedb1c76ed87bd95
SHA1901c0f6c4757d37d5a2e357704344aeb31a9cadb
SHA25637d78483538af016b7646678df08893badea86d7b5f4317b99393bbcd3c172b9
SHA512e87c6aeaa1cc7a69f390c57d4cbcc1efa3cb5349a445831f822f7843b3a3d850f9793818d4e1e7fe011a5af0e99bbdb7cf8a5ec13541dedb8431fc47ef9f33b1
-
Filesize
146KB
MD518c83c689100e66caedb1c76ed87bd95
SHA1901c0f6c4757d37d5a2e357704344aeb31a9cadb
SHA25637d78483538af016b7646678df08893badea86d7b5f4317b99393bbcd3c172b9
SHA512e87c6aeaa1cc7a69f390c57d4cbcc1efa3cb5349a445831f822f7843b3a3d850f9793818d4e1e7fe011a5af0e99bbdb7cf8a5ec13541dedb8431fc47ef9f33b1
-
Filesize
219KB
MD5861e3902ecc188eba323032a88d1e56e
SHA16c6265be666d9c93acd6ddc55e94a9de8580191c
SHA25679ae1f344b550f57a9f03ec18894df1b9b255b865b5872801d0f043c1b77eb84
SHA512044f284dd78b7aad2f733628c901d7bd1067436d76c4b3fad3bf024f8faecaaf38e453053431daf7afa8c8b14f5eea6fe4f75148b8923ac2441f966ac118cec4
-
Filesize
24KB
MD583521374a9132135d3bb5f44edf87b0c
SHA18c32ff99d92310b0fe3e618453d929fa9cf15ef2
SHA2564942626858e7a1ea7a2c543f2207eb5bbae4715e328d7b0f2afc396be042c80a
SHA5129ea2599188401d984e71008dcf942bdb47c77c90b157b5ee5387ffb716e14529920aedbf3251d7f20ff69ee7fc5e9955626522abdc2ae6c9391a6ada7478ce7c
-
Filesize
156KB
MD5c1ca4a842399156d6ce56df9fe167158
SHA1c24482b800d11e8f0238df3d950b745f38c245e7
SHA256197d8be66fca12a1c137e920a49610b38f29756c7b7473ec1962c6499918f15a
SHA512a89f3170db1de6f296b12c42059495821ef6e9b03a8e3e58aafcfa5cfab8cc0f996e5498476f638a80f604a2c2d6b7d626bd621b35b0c4502b6916aa1380e1c9
-
Filesize
156KB
MD5c1ca4a842399156d6ce56df9fe167158
SHA1c24482b800d11e8f0238df3d950b745f38c245e7
SHA256197d8be66fca12a1c137e920a49610b38f29756c7b7473ec1962c6499918f15a
SHA512a89f3170db1de6f296b12c42059495821ef6e9b03a8e3e58aafcfa5cfab8cc0f996e5498476f638a80f604a2c2d6b7d626bd621b35b0c4502b6916aa1380e1c9
-
Filesize
156KB
MD5181f22855f833b2d0f633f1c4efcfc76
SHA1a225cb04ff1c704779f02be2ed847b6fe3bcc594
SHA2563a03fd1047afb37b0e72e4da74ab70bf5e7fb80193ea7099b06fe37c42d867bf
SHA512b37e3443ebd2dad2d7adadfddc7c73724f2a32476debfdcc779ed039f69ec965729cab15a37dc37c499a9b12c0b782c12468164faf9004f0c10322072e2c31d1
-
Filesize
156KB
MD5181f22855f833b2d0f633f1c4efcfc76
SHA1a225cb04ff1c704779f02be2ed847b6fe3bcc594
SHA2563a03fd1047afb37b0e72e4da74ab70bf5e7fb80193ea7099b06fe37c42d867bf
SHA512b37e3443ebd2dad2d7adadfddc7c73724f2a32476debfdcc779ed039f69ec965729cab15a37dc37c499a9b12c0b782c12468164faf9004f0c10322072e2c31d1
-
Filesize
146KB
MD518c83c689100e66caedb1c76ed87bd95
SHA1901c0f6c4757d37d5a2e357704344aeb31a9cadb
SHA25637d78483538af016b7646678df08893badea86d7b5f4317b99393bbcd3c172b9
SHA512e87c6aeaa1cc7a69f390c57d4cbcc1efa3cb5349a445831f822f7843b3a3d850f9793818d4e1e7fe011a5af0e99bbdb7cf8a5ec13541dedb8431fc47ef9f33b1
-
Filesize
146KB
MD518c83c689100e66caedb1c76ed87bd95
SHA1901c0f6c4757d37d5a2e357704344aeb31a9cadb
SHA25637d78483538af016b7646678df08893badea86d7b5f4317b99393bbcd3c172b9
SHA512e87c6aeaa1cc7a69f390c57d4cbcc1efa3cb5349a445831f822f7843b3a3d850f9793818d4e1e7fe011a5af0e99bbdb7cf8a5ec13541dedb8431fc47ef9f33b1
-
Filesize
219KB
MD5861e3902ecc188eba323032a88d1e56e
SHA16c6265be666d9c93acd6ddc55e94a9de8580191c
SHA25679ae1f344b550f57a9f03ec18894df1b9b255b865b5872801d0f043c1b77eb84
SHA512044f284dd78b7aad2f733628c901d7bd1067436d76c4b3fad3bf024f8faecaaf38e453053431daf7afa8c8b14f5eea6fe4f75148b8923ac2441f966ac118cec4
-
Filesize
219KB
MD5861e3902ecc188eba323032a88d1e56e
SHA16c6265be666d9c93acd6ddc55e94a9de8580191c
SHA25679ae1f344b550f57a9f03ec18894df1b9b255b865b5872801d0f043c1b77eb84
SHA512044f284dd78b7aad2f733628c901d7bd1067436d76c4b3fad3bf024f8faecaaf38e453053431daf7afa8c8b14f5eea6fe4f75148b8923ac2441f966ac118cec4
-
Filesize
24KB
MD583521374a9132135d3bb5f44edf87b0c
SHA18c32ff99d92310b0fe3e618453d929fa9cf15ef2
SHA2564942626858e7a1ea7a2c543f2207eb5bbae4715e328d7b0f2afc396be042c80a
SHA5129ea2599188401d984e71008dcf942bdb47c77c90b157b5ee5387ffb716e14529920aedbf3251d7f20ff69ee7fc5e9955626522abdc2ae6c9391a6ada7478ce7c
-
Filesize
24KB
MD583521374a9132135d3bb5f44edf87b0c
SHA18c32ff99d92310b0fe3e618453d929fa9cf15ef2
SHA2564942626858e7a1ea7a2c543f2207eb5bbae4715e328d7b0f2afc396be042c80a
SHA5129ea2599188401d984e71008dcf942bdb47c77c90b157b5ee5387ffb716e14529920aedbf3251d7f20ff69ee7fc5e9955626522abdc2ae6c9391a6ada7478ce7c