Analysis
-
max time kernel
155s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2022 20:25
Static task
static1
Behavioral task
behavioral1
Sample
99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe
Resource
win10v2004-20220812-en
General
-
Target
99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe
-
Size
950KB
-
MD5
66d7ba529e622874ade904cd081c0166
-
SHA1
2ff4dda80a4e4aa9390097f689c0e0bcce1c2b76
-
SHA256
99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136
-
SHA512
280df746e26e3aab513364385fdafc4cfed861d2aee56fac9e78bd707d65f4873afc7e6ecae1fee589dd7fb1c372d1db8e7839ddd85fed14fefda10591cf1714
-
SSDEEP
6144:a+nglw9ayQv3ahvyn/PU7O0KXgTTSj9ltfgIg+oa+ZEN2ERBOzi0q5Lm17z6qRBT:rjS3Yvyn/0TkLF+I0q5Lvqsgvzqa
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe smrss.exe" 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe -
Executes dropped EXE 1 IoCs
pid Process 3840 33224.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\freizer = "C:\\WINDOWS\\system32\\freizer.exe" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\WINDOWS\\system32\\svchost.exe" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\freizer.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File created C:\Windows\SysWOW64\smrss.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Windows\SysWOW64\smrss.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstat.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\rmiregistry.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javafxpackager.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmap.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\keytool.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\ktab.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jp2launcher.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_pwa_launcher.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jarsigner.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jcmd.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jdeps.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jps.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jsadebugd.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaw.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\ktab.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\wsimport.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java-rmi.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jrunscript.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmiregistry.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\7-Zip\7z.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\appletviewer.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\extcheck.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\idlj.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java-rmi.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javac.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaws.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstack.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\orbd.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jjs.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\klist.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\pack200.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstatd.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\klist.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmic.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\serialver.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\unpack200.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\keytool.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jconsole.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\kinit.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\policytool.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jhat.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\native2ascii.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\orbd.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\nbexec64.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\pack200.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\wsgen.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\unpack200.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\svchost.exe 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5020 wrote to memory of 2080 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 80 PID 5020 wrote to memory of 2080 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 80 PID 5020 wrote to memory of 2080 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 80 PID 5020 wrote to memory of 2256 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 81 PID 5020 wrote to memory of 2256 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 81 PID 5020 wrote to memory of 2256 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 81 PID 2256 wrote to memory of 2028 2256 cmd.exe 84 PID 2256 wrote to memory of 2028 2256 cmd.exe 84 PID 2256 wrote to memory of 2028 2256 cmd.exe 84 PID 2080 wrote to memory of 2552 2080 cmd.exe 85 PID 2080 wrote to memory of 2552 2080 cmd.exe 85 PID 2080 wrote to memory of 2552 2080 cmd.exe 85 PID 5020 wrote to memory of 3840 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 86 PID 5020 wrote to memory of 3840 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 86 PID 5020 wrote to memory of 3840 5020 99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe"C:\Users\Admin\AppData\Local\Temp\99c89b7539f253d895631e0f4371a29e0aed7a66b0bc6a0bbdbbfcd60dda7136.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f3⤵
- Adds Run key to start application
PID:2552
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f3⤵
- Adds Run key to start application
PID:2028
-
-
-
C:\windows\temp\33224.exe"C:\windows\temp\33224.exe"2⤵
- Executes dropped EXE
PID:3840
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD537f7b0efb7593d4f636e5a106e8a09b0
SHA1dff40ff99d3dc9510f1db10ffe219039892f5808
SHA25663bdaa0b87995260c596956694c5a2111d855032cbd8a1f2e9a7e9fc8bbfc03f
SHA5129eb49cead844c69836dfe1f73258b38c90ef487de18cd8e9687cc335c47b345df3d56e96beed4ea17e09715b578fcbf7f9c10cc4786e1b97cdbc3cee0763089c
-
Filesize
26KB
MD537f7b0efb7593d4f636e5a106e8a09b0
SHA1dff40ff99d3dc9510f1db10ffe219039892f5808
SHA25663bdaa0b87995260c596956694c5a2111d855032cbd8a1f2e9a7e9fc8bbfc03f
SHA5129eb49cead844c69836dfe1f73258b38c90ef487de18cd8e9687cc335c47b345df3d56e96beed4ea17e09715b578fcbf7f9c10cc4786e1b97cdbc3cee0763089c