Analysis
-
max time kernel
152s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe
Resource
win10v2004-20220812-en
General
-
Target
b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe
-
Size
554KB
-
MD5
672d6fc27866ed1b169eefbd345528a2
-
SHA1
3632c923020b963e245ace4f9fd752a34c450ffc
-
SHA256
b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae
-
SHA512
f35def01af4527c7bfe257c6c77e89ad626503837b03b056bc626236c037767cf851532ecdaf268acbf8ccf7f19612e88715a64ce28f481cdcb0b9761032bbee
-
SSDEEP
6144:nJlQdETNux0Domh0l0WHMVGOfj2wqrpdN+sXGCJzsDzCErXW0DnBtJSqvKcysxV6:nJDTNNomKHM4y6TPBJIDzCoXW0tbNxiR
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" FnfkMdrzTmNc1yAh.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ceuikek.exe -
Executes dropped EXE 7 IoCs
pid Process 1972 FnfkMdrzTmNc1yAh.exe 1460 gob.exe 1364 hob.exe 980 gob.exe 904 ceuikek.exe 1500 hob.exe 332 csrss.exe -
Deletes itself 1 IoCs
pid Process 1344 cmd.exe -
Loads dropped DLL 8 IoCs
pid Process 2008 b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe 2008 b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe 2008 b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe 2008 b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe 2008 b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe 2008 b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe 1972 FnfkMdrzTmNc1yAh.exe 1972 FnfkMdrzTmNc1yAh.exe -
Adds Run key to start application 2 TTPs 55 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /k" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /C" ceuikek.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /f" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /g" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /W" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /X" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /c" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /S" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /F" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /H" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /Y" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /U" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /p" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /h" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /R" ceuikek.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ FnfkMdrzTmNc1yAh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /s" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /T" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /v" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /D" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /P" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /z" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /b" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /e" FnfkMdrzTmNc1yAh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /e" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /n" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /L" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /u" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /a" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /A" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /t" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /N" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /J" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /m" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /r" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /V" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /Z" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /j" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /d" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /w" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /o" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /Q" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /x" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /i" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /y" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /B" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /M" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /q" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /O" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /l" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /G" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /E" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /K" ceuikek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuikek = "C:\\Users\\Admin\\ceuikek.exe /I" ceuikek.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created \systemroot\assembly\GAC_64\Desktop.ini csrss.exe File created \systemroot\assembly\GAC_32\Desktop.ini csrss.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1460 set thread context of 980 1460 gob.exe 33 PID 1364 set thread context of 1500 1364 hob.exe 39 PID 1500 set thread context of 1472 1500 hob.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1728 tasklist.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \registry\machine\Software\Classes\Interface\{7c04e45a-7eff-1ae5-5f05-3a4f471ab8fb} explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7c04e45a-7eff-1ae5-5f05-3a4f471ab8fb}\u = "30348" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7c04e45a-7eff-1ae5-5f05-3a4f471ab8fb}\cid = "8936580867070895610" explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1972 FnfkMdrzTmNc1yAh.exe 980 gob.exe 1972 FnfkMdrzTmNc1yAh.exe 980 gob.exe 904 ceuikek.exe 980 gob.exe 904 ceuikek.exe 980 gob.exe 980 gob.exe 904 ceuikek.exe 904 ceuikek.exe 904 ceuikek.exe 980 gob.exe 904 ceuikek.exe 980 gob.exe 904 ceuikek.exe 980 gob.exe 904 ceuikek.exe 904 ceuikek.exe 904 ceuikek.exe 980 gob.exe 980 gob.exe 980 gob.exe 904 ceuikek.exe 980 gob.exe 980 gob.exe 904 ceuikek.exe 904 ceuikek.exe 904 ceuikek.exe 980 gob.exe 1472 explorer.exe 1472 explorer.exe 980 gob.exe 1472 explorer.exe 904 ceuikek.exe 980 gob.exe 904 ceuikek.exe 980 gob.exe 980 gob.exe 904 ceuikek.exe 904 ceuikek.exe 980 gob.exe 980 gob.exe 980 gob.exe 904 ceuikek.exe 980 gob.exe 904 ceuikek.exe 980 gob.exe 904 ceuikek.exe 980 gob.exe 980 gob.exe 904 ceuikek.exe 980 gob.exe 980 gob.exe 904 ceuikek.exe 904 ceuikek.exe 904 ceuikek.exe 980 gob.exe 980 gob.exe 980 gob.exe 980 gob.exe 904 ceuikek.exe 980 gob.exe 980 gob.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1728 tasklist.exe Token: SeDebugPrivilege 1472 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1972 FnfkMdrzTmNc1yAh.exe 904 ceuikek.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 332 csrss.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1972 2008 b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe 28 PID 2008 wrote to memory of 1972 2008 b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe 28 PID 2008 wrote to memory of 1972 2008 b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe 28 PID 2008 wrote to memory of 1972 2008 b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe 28 PID 2008 wrote to memory of 1460 2008 b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe 29 PID 2008 wrote to memory of 1460 2008 b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe 29 PID 2008 wrote to memory of 1460 2008 b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe 29 PID 2008 wrote to memory of 1460 2008 b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe 29 PID 2008 wrote to memory of 1364 2008 b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe 30 PID 2008 wrote to memory of 1364 2008 b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe 30 PID 2008 wrote to memory of 1364 2008 b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe 30 PID 2008 wrote to memory of 1364 2008 b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe 30 PID 2008 wrote to memory of 1344 2008 b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe 31 PID 2008 wrote to memory of 1344 2008 b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe 31 PID 2008 wrote to memory of 1344 2008 b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe 31 PID 2008 wrote to memory of 1344 2008 b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe 31 PID 1460 wrote to memory of 980 1460 gob.exe 33 PID 1460 wrote to memory of 980 1460 gob.exe 33 PID 1460 wrote to memory of 980 1460 gob.exe 33 PID 1460 wrote to memory of 980 1460 gob.exe 33 PID 1460 wrote to memory of 980 1460 gob.exe 33 PID 1460 wrote to memory of 980 1460 gob.exe 33 PID 1460 wrote to memory of 980 1460 gob.exe 33 PID 1460 wrote to memory of 980 1460 gob.exe 33 PID 1460 wrote to memory of 980 1460 gob.exe 33 PID 1460 wrote to memory of 980 1460 gob.exe 33 PID 1460 wrote to memory of 980 1460 gob.exe 33 PID 1972 wrote to memory of 904 1972 FnfkMdrzTmNc1yAh.exe 34 PID 1972 wrote to memory of 904 1972 FnfkMdrzTmNc1yAh.exe 34 PID 1972 wrote to memory of 904 1972 FnfkMdrzTmNc1yAh.exe 34 PID 1972 wrote to memory of 904 1972 FnfkMdrzTmNc1yAh.exe 34 PID 1972 wrote to memory of 536 1972 FnfkMdrzTmNc1yAh.exe 35 PID 1972 wrote to memory of 536 1972 FnfkMdrzTmNc1yAh.exe 35 PID 1972 wrote to memory of 536 1972 FnfkMdrzTmNc1yAh.exe 35 PID 1972 wrote to memory of 536 1972 FnfkMdrzTmNc1yAh.exe 35 PID 536 wrote to memory of 1728 536 cmd.exe 37 PID 536 wrote to memory of 1728 536 cmd.exe 37 PID 536 wrote to memory of 1728 536 cmd.exe 37 PID 536 wrote to memory of 1728 536 cmd.exe 37 PID 1364 wrote to memory of 1500 1364 hob.exe 39 PID 1364 wrote to memory of 1500 1364 hob.exe 39 PID 1364 wrote to memory of 1500 1364 hob.exe 39 PID 1364 wrote to memory of 1500 1364 hob.exe 39 PID 1364 wrote to memory of 1500 1364 hob.exe 39 PID 1364 wrote to memory of 1500 1364 hob.exe 39 PID 1364 wrote to memory of 1500 1364 hob.exe 39 PID 1364 wrote to memory of 1500 1364 hob.exe 39 PID 1364 wrote to memory of 1500 1364 hob.exe 39 PID 1364 wrote to memory of 1500 1364 hob.exe 39 PID 1364 wrote to memory of 1500 1364 hob.exe 39 PID 1500 wrote to memory of 1472 1500 hob.exe 40 PID 1500 wrote to memory of 1472 1500 hob.exe 40 PID 1500 wrote to memory of 1472 1500 hob.exe 40 PID 1500 wrote to memory of 1472 1500 hob.exe 40 PID 1500 wrote to memory of 1472 1500 hob.exe 40 PID 1472 wrote to memory of 332 1472 explorer.exe 6
Processes
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious use of UnmapMainImage
PID:332
-
C:\Users\Admin\AppData\Local\Temp\b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe"C:\Users\Admin\AppData\Local\Temp\b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\FnfkMdrzTmNc1yAh.exeFnfkMdrzTmNc1yAh.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\ceuikek.exe"C:\Users\Admin\ceuikek.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:904
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del FnfkMdrzTmNc1yAh.exe3⤵
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
-
-
C:\Users\Admin\gob.exegob.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\gob.exegob.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:980
-
-
-
C:\Users\Admin\hob.exehob.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\hob.exehob.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\explorer.exe0000003C*4⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1472
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del b07e2ab5bc00089f4d2f9c9c07381cd979a65802e6ddcbc27869a4a6275cccae.exe2⤵
- Deletes itself
PID:1344
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD579ae16815b3dc635f6b3997e9e27bac5
SHA16747cb105b76177fe0f30f409992ebcbe79d9031
SHA256b7bc54022c40a0919f8e70729e460b807f4fab47f1570429642cefaf1a84825c
SHA512e2fa7b07936a6a03ce6399f087913460da814f903e2e30b77c36ab741f0b3a2daa755307dda86f6c220814dfb7173087fcc9419b0946feb3652992101551509e
-
Filesize
156KB
MD579ae16815b3dc635f6b3997e9e27bac5
SHA16747cb105b76177fe0f30f409992ebcbe79d9031
SHA256b7bc54022c40a0919f8e70729e460b807f4fab47f1570429642cefaf1a84825c
SHA512e2fa7b07936a6a03ce6399f087913460da814f903e2e30b77c36ab741f0b3a2daa755307dda86f6c220814dfb7173087fcc9419b0946feb3652992101551509e
-
Filesize
156KB
MD5cb126e3fb83dc477c7af7aae2a25c8f9
SHA1a5e4b02e7af4667bb14d7aa5eb81172ecceaeb79
SHA256750ce816a575202c3ef4380909cf1dfabcdcd17da51434a2e6f9610920460b7e
SHA512ab8a19866f09f61fa8d7f7272c7ca34fb3fbbb8d4390864d171cb24c3380c29875cd26f4c5698a40a85ad26bb44ee4da6735a247c2c22131ea3309116142fd55
-
Filesize
156KB
MD5cb126e3fb83dc477c7af7aae2a25c8f9
SHA1a5e4b02e7af4667bb14d7aa5eb81172ecceaeb79
SHA256750ce816a575202c3ef4380909cf1dfabcdcd17da51434a2e6f9610920460b7e
SHA512ab8a19866f09f61fa8d7f7272c7ca34fb3fbbb8d4390864d171cb24c3380c29875cd26f4c5698a40a85ad26bb44ee4da6735a247c2c22131ea3309116142fd55
-
Filesize
161KB
MD54b6fa8ae2b0e19379b5714c4c7f092de
SHA12dfd145fc1d36a563fd6a635e4821333b35a806c
SHA256afd1981bc28c9d72032f728a1590b38bec3e62d0865b23b9b234efce197e461b
SHA5123c5e95f37a3af9beec52a6c868ebf83ebde30db4ee74bbf2d50b45fbad5b56fb5c5807b3d9b8b1964835bf733e0d979961ffe60a1ff5a8e3ccc68f3dd306d666
-
Filesize
161KB
MD54b6fa8ae2b0e19379b5714c4c7f092de
SHA12dfd145fc1d36a563fd6a635e4821333b35a806c
SHA256afd1981bc28c9d72032f728a1590b38bec3e62d0865b23b9b234efce197e461b
SHA5123c5e95f37a3af9beec52a6c868ebf83ebde30db4ee74bbf2d50b45fbad5b56fb5c5807b3d9b8b1964835bf733e0d979961ffe60a1ff5a8e3ccc68f3dd306d666
-
Filesize
161KB
MD54b6fa8ae2b0e19379b5714c4c7f092de
SHA12dfd145fc1d36a563fd6a635e4821333b35a806c
SHA256afd1981bc28c9d72032f728a1590b38bec3e62d0865b23b9b234efce197e461b
SHA5123c5e95f37a3af9beec52a6c868ebf83ebde30db4ee74bbf2d50b45fbad5b56fb5c5807b3d9b8b1964835bf733e0d979961ffe60a1ff5a8e3ccc68f3dd306d666
-
Filesize
251KB
MD516444106daf5666cdc067c2a83f22756
SHA12c913d2e8688cda3cdab7373a8a6b1fa3bb7cdb8
SHA256b14c99c27463e136c110f474a76fed9992eba37e7e5d46ef1ba7312e3997ba55
SHA51259ecd51441d13add17328d01680db4a428803effc9caabda9303c0bd8f8824b599c53c289d77a843c3f1c57656439be052e0f90031b22d8cda9e6b54bdd70772
-
Filesize
251KB
MD516444106daf5666cdc067c2a83f22756
SHA12c913d2e8688cda3cdab7373a8a6b1fa3bb7cdb8
SHA256b14c99c27463e136c110f474a76fed9992eba37e7e5d46ef1ba7312e3997ba55
SHA51259ecd51441d13add17328d01680db4a428803effc9caabda9303c0bd8f8824b599c53c289d77a843c3f1c57656439be052e0f90031b22d8cda9e6b54bdd70772
-
Filesize
251KB
MD516444106daf5666cdc067c2a83f22756
SHA12c913d2e8688cda3cdab7373a8a6b1fa3bb7cdb8
SHA256b14c99c27463e136c110f474a76fed9992eba37e7e5d46ef1ba7312e3997ba55
SHA51259ecd51441d13add17328d01680db4a428803effc9caabda9303c0bd8f8824b599c53c289d77a843c3f1c57656439be052e0f90031b22d8cda9e6b54bdd70772
-
Filesize
52KB
MD51812577ddfa736694a8dbad896d329d7
SHA1a6831421aa2c04b93078df35d4bd2eed62985060
SHA256c9173337e91ef6a59658dd60f713517eddd8cb43196dcc970266cbc12c33d5df
SHA512d470c44c8e969b182dae8b2451075b525a9f1fc349737db19966581cb76289b1cac00cf6b7920c53959aaaedabd47385acc6b74dce2cc8f6a54a5ed882901d34
-
Filesize
156KB
MD579ae16815b3dc635f6b3997e9e27bac5
SHA16747cb105b76177fe0f30f409992ebcbe79d9031
SHA256b7bc54022c40a0919f8e70729e460b807f4fab47f1570429642cefaf1a84825c
SHA512e2fa7b07936a6a03ce6399f087913460da814f903e2e30b77c36ab741f0b3a2daa755307dda86f6c220814dfb7173087fcc9419b0946feb3652992101551509e
-
Filesize
156KB
MD579ae16815b3dc635f6b3997e9e27bac5
SHA16747cb105b76177fe0f30f409992ebcbe79d9031
SHA256b7bc54022c40a0919f8e70729e460b807f4fab47f1570429642cefaf1a84825c
SHA512e2fa7b07936a6a03ce6399f087913460da814f903e2e30b77c36ab741f0b3a2daa755307dda86f6c220814dfb7173087fcc9419b0946feb3652992101551509e
-
Filesize
156KB
MD5cb126e3fb83dc477c7af7aae2a25c8f9
SHA1a5e4b02e7af4667bb14d7aa5eb81172ecceaeb79
SHA256750ce816a575202c3ef4380909cf1dfabcdcd17da51434a2e6f9610920460b7e
SHA512ab8a19866f09f61fa8d7f7272c7ca34fb3fbbb8d4390864d171cb24c3380c29875cd26f4c5698a40a85ad26bb44ee4da6735a247c2c22131ea3309116142fd55
-
Filesize
156KB
MD5cb126e3fb83dc477c7af7aae2a25c8f9
SHA1a5e4b02e7af4667bb14d7aa5eb81172ecceaeb79
SHA256750ce816a575202c3ef4380909cf1dfabcdcd17da51434a2e6f9610920460b7e
SHA512ab8a19866f09f61fa8d7f7272c7ca34fb3fbbb8d4390864d171cb24c3380c29875cd26f4c5698a40a85ad26bb44ee4da6735a247c2c22131ea3309116142fd55
-
Filesize
161KB
MD54b6fa8ae2b0e19379b5714c4c7f092de
SHA12dfd145fc1d36a563fd6a635e4821333b35a806c
SHA256afd1981bc28c9d72032f728a1590b38bec3e62d0865b23b9b234efce197e461b
SHA5123c5e95f37a3af9beec52a6c868ebf83ebde30db4ee74bbf2d50b45fbad5b56fb5c5807b3d9b8b1964835bf733e0d979961ffe60a1ff5a8e3ccc68f3dd306d666
-
Filesize
161KB
MD54b6fa8ae2b0e19379b5714c4c7f092de
SHA12dfd145fc1d36a563fd6a635e4821333b35a806c
SHA256afd1981bc28c9d72032f728a1590b38bec3e62d0865b23b9b234efce197e461b
SHA5123c5e95f37a3af9beec52a6c868ebf83ebde30db4ee74bbf2d50b45fbad5b56fb5c5807b3d9b8b1964835bf733e0d979961ffe60a1ff5a8e3ccc68f3dd306d666
-
Filesize
251KB
MD516444106daf5666cdc067c2a83f22756
SHA12c913d2e8688cda3cdab7373a8a6b1fa3bb7cdb8
SHA256b14c99c27463e136c110f474a76fed9992eba37e7e5d46ef1ba7312e3997ba55
SHA51259ecd51441d13add17328d01680db4a428803effc9caabda9303c0bd8f8824b599c53c289d77a843c3f1c57656439be052e0f90031b22d8cda9e6b54bdd70772
-
Filesize
251KB
MD516444106daf5666cdc067c2a83f22756
SHA12c913d2e8688cda3cdab7373a8a6b1fa3bb7cdb8
SHA256b14c99c27463e136c110f474a76fed9992eba37e7e5d46ef1ba7312e3997ba55
SHA51259ecd51441d13add17328d01680db4a428803effc9caabda9303c0bd8f8824b599c53c289d77a843c3f1c57656439be052e0f90031b22d8cda9e6b54bdd70772
-
Filesize
52KB
MD51812577ddfa736694a8dbad896d329d7
SHA1a6831421aa2c04b93078df35d4bd2eed62985060
SHA256c9173337e91ef6a59658dd60f713517eddd8cb43196dcc970266cbc12c33d5df
SHA512d470c44c8e969b182dae8b2451075b525a9f1fc349737db19966581cb76289b1cac00cf6b7920c53959aaaedabd47385acc6b74dce2cc8f6a54a5ed882901d34