Analysis
-
max time kernel
106s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe
Resource
win10v2004-20220812-en
General
-
Target
03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe
-
Size
223KB
-
MD5
46b53f7b55c770d09ffa12c65bea34a6
-
SHA1
8a6003ff0d07c5b3fb0e69428328d3c46b699469
-
SHA256
03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784
-
SHA512
3d10903f2a0ef003e87d522c888054c8db9ef009ab41942f0e9fc3a739cbaeaf972ba37394bfa259e08480305e049ba2ab9b912745808f2f60f08357656576bb
-
SSDEEP
3072:gEHPJBytw176VhQO3c5ZxW5R1cmgwq18KGm0usOLUUG:gyhwq1eHQO3chCcTwSdAeH
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 18 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Configurable\System services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\GloballyOpenPorts services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Configurable services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static\System services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\GloballyOpenPorts services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\AuthorizedApplications services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications services.exe -
Modifies security service 2 TTPs 22 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\TriggerInfo\0 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Parameters services.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\DeleteFlag = "1" services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\Teredo services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\TriggerInfo 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\ErrorControl = "0" services.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\DeleteFlag = "1" services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Security services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\IPTLSIn services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Security services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Security 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Start = "4" services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\IPTLSOut services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Parameters 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Type = "32" services.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Type = "32" services.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\ErrorControl = "0" services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\RPC-EPMap services.exe -
Executes dropped EXE 2 IoCs
pid Process 1268 Explorer.EXE 460 services.exe -
Registers COM server for autorun 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32\ThreadingModel = "Both" 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32\ = "C:\\$Recycle.Bin\\S-1-5-21-3845472200-3839195424-595303356-1000\\$bb8ab67ad8382496fd4eead6952e3208\\n." 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\InprocServer32\ = "C:\\$Recycle.Bin\\S-1-5-18\\$bb8ab67ad8382496fd4eead6952e3208\\n." 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe -
Unexpected DNS network traffic destination 9 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 194.165.17.3 Destination IP 194.165.17.3 Destination IP 194.165.17.3 Destination IP 194.165.17.3 Destination IP 194.165.17.3 Destination IP 194.165.17.3 Destination IP 194.165.17.3 Destination IP 194.165.17.3 Destination IP 194.165.17.3 -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2004 set thread context of 1900 2004 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe 28 PID 2004 set thread context of 1900 2004 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe 28 PID 2004 set thread context of 1900 2004 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe 28 -
Drops file in Program Files directory 18 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\de-DE:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MpAsDesc.dll:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MpCommu.dll:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MsMpCom.dll:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\en-US:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MsMpLics.dll:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\es-ES:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\fr-FR:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MpClient.dll:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MpRTP.dll:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MpSvc.dll:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MsMpRes.dll:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\it-IT:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\ja-JP:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MpEvMsg.dll:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MpOAV.dll:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9} 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32\ThreadingModel = "Both" 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32\ = "C:\\$Recycle.Bin\\S-1-5-21-3845472200-3839195424-595303356-1000\\$bb8ab67ad8382496fd4eead6952e3208\\n." 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\InprocServer32\ = "C:\\$Recycle.Bin\\S-1-5-18\\$bb8ab67ad8382496fd4eead6952e3208\\n." 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\clsid 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe -
NTFS ADS 18 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\ja-JP:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MpClient.dll:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MpCommu.dll:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MpEvMsg.dll:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MpOAV.dll:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\en-US:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\es-ES:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\it-IT:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MpRTP.dll:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MpSvc.dll:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MsMpCom.dll:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MsMpLics.dll:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\de-DE:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\fr-FR:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MpAsDesc.dll:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe File opened for modification C:\Program Files\Windows Defender\MsMpRes.dll:! 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1900 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe 1900 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe 1900 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe 1900 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe 1900 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe 1900 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2004 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1900 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1900 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe Token: SeDebugPrivilege 1900 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe Token: SeDebugPrivilege 1900 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe Token: SeBackupPrivilege 460 services.exe Token: SeRestorePrivilege 460 services.exe Token: SeSecurityPrivilege 460 services.exe Token: SeTakeOwnershipPrivilege 460 services.exe Token: SeBackupPrivilege 460 services.exe Token: SeRestorePrivilege 460 services.exe Token: SeSecurityPrivilege 460 services.exe Token: SeTakeOwnershipPrivilege 460 services.exe Token: SeBackupPrivilege 460 services.exe Token: SeRestorePrivilege 460 services.exe Token: SeSecurityPrivilege 460 services.exe Token: SeTakeOwnershipPrivilege 460 services.exe Token: SeBackupPrivilege 460 services.exe Token: SeRestorePrivilege 460 services.exe Token: SeSecurityPrivilege 460 services.exe Token: SeTakeOwnershipPrivilege 460 services.exe Token: SeBackupPrivilege 460 services.exe Token: SeRestorePrivilege 460 services.exe Token: SeSecurityPrivilege 460 services.exe Token: SeTakeOwnershipPrivilege 460 services.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2004 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe 1900 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1900 2004 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe 28 PID 2004 wrote to memory of 1900 2004 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe 28 PID 2004 wrote to memory of 1900 2004 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe 28 PID 2004 wrote to memory of 1900 2004 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe 28 PID 1900 wrote to memory of 1268 1900 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe 16 PID 1900 wrote to memory of 1268 1900 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe 16 PID 1900 wrote to memory of 460 1900 03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe 2
Processes
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵
- Modifies firewall policy service
- Modifies security service
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:460
-
C:\Users\Admin\AppData\Local\Temp\03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe"C:\Users\Admin\AppData\Local\Temp\03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe"C:\Users\Admin\AppData\Local\Temp\03fa9b831b2526b0979906006056f3122208d6fcfdc01117d1e8a27fd2155784.exe"2⤵
- Modifies security service
- Registers COM server for autorun
- Drops file in Program Files directory
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1900
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1268
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD557cfc364d18bf71fc9a2622fed429464
SHA1dd7db102d6e42e72b8e8a6ca60d6384b2b89cb4e
SHA256dc975308a4a86e1b7a7819cf6305dd5551150e826d6ac684b30cdddc44685c9c
SHA5120d005e2fbfc5d3126e6f9b3085107ec08c05d6b96803c7f172151d08b2146b40cd31333392f2a028e2827a8d847f1af498de3ae99435bf2b5b5a14ae1907eed5
-
Filesize
25KB
MD59e0cd37b6d0809cf7d5fa5b521538d0d
SHA1411ffdbe6c151dbd417bc59fa9dfec22b0adc9f2
SHA25655d9748f0556576a8d522cf4b8dcfc9717436adcc487d49b3320770432960db2
SHA512b511ee744dbe6cf0f54cb840d3786e89161115d0038425dde86d57752f76cae7a05f020120b43dc1444bd914c8c1690049e456635cc794fbf90e26794587dfc5
-
Filesize
25KB
MD59e0cd37b6d0809cf7d5fa5b521538d0d
SHA1411ffdbe6c151dbd417bc59fa9dfec22b0adc9f2
SHA25655d9748f0556576a8d522cf4b8dcfc9717436adcc487d49b3320770432960db2
SHA512b511ee744dbe6cf0f54cb840d3786e89161115d0038425dde86d57752f76cae7a05f020120b43dc1444bd914c8c1690049e456635cc794fbf90e26794587dfc5
-
Filesize
25KB
MD59e0cd37b6d0809cf7d5fa5b521538d0d
SHA1411ffdbe6c151dbd417bc59fa9dfec22b0adc9f2
SHA25655d9748f0556576a8d522cf4b8dcfc9717436adcc487d49b3320770432960db2
SHA512b511ee744dbe6cf0f54cb840d3786e89161115d0038425dde86d57752f76cae7a05f020120b43dc1444bd914c8c1690049e456635cc794fbf90e26794587dfc5
-
Filesize
25KB
MD59e0cd37b6d0809cf7d5fa5b521538d0d
SHA1411ffdbe6c151dbd417bc59fa9dfec22b0adc9f2
SHA25655d9748f0556576a8d522cf4b8dcfc9717436adcc487d49b3320770432960db2
SHA512b511ee744dbe6cf0f54cb840d3786e89161115d0038425dde86d57752f76cae7a05f020120b43dc1444bd914c8c1690049e456635cc794fbf90e26794587dfc5