Analysis
-
max time kernel
132s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 20:01
Static task
static1
Behavioral task
behavioral1
Sample
71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe
Resource
win10v2004-20220901-en
General
-
Target
71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe
-
Size
829KB
-
MD5
02b00feab59fb4a9f53a374e2bb856c0
-
SHA1
68caef5e829c036a4144fb6b5190d728e646d6e5
-
SHA256
71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591
-
SHA512
756f34000b1ce232c73d893e045d59941d5755283e5c7a77e20d8192e7761776dbb4e20d43cad48c7c932e26662b4abe09d29822cad2dd2b1ebaa5f15f55f001
-
SSDEEP
6144:a+nglw9ayQv3ahvyn/PU7O0KXgTTSjyEN2ERBOzllz5jtGvA4q1jtGvA4qMVhVK:rjS3Yvyn/0Tvlzq44qW44qMVhVK
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe smrss.exe" 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe -
Executes dropped EXE 1 IoCs
pid Process 1300 13223.exe -
Loads dropped DLL 2 IoCs
pid Process 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\WINDOWS\\system32\\svchost.exe" reg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\freizer = "C:\\WINDOWS\\system32\\freizer.exe" reg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\smrss.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Windows\SysWOW64\smrss.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File created C:\WINDOWS\SysWOW64\freizer.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Media Player\WMPSideShowGadget.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Windows Journal\Journal.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Windows Media Player\wmlaunch.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Windows Media Player\wmpshare.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-hang-ui.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\notification_helper.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\svchost.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 904 wrote to memory of 1928 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 27 PID 904 wrote to memory of 1928 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 27 PID 904 wrote to memory of 1928 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 27 PID 904 wrote to memory of 1928 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 27 PID 904 wrote to memory of 956 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 28 PID 904 wrote to memory of 956 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 28 PID 904 wrote to memory of 956 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 28 PID 904 wrote to memory of 956 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 28 PID 1928 wrote to memory of 1412 1928 cmd.exe 31 PID 1928 wrote to memory of 1412 1928 cmd.exe 31 PID 1928 wrote to memory of 1412 1928 cmd.exe 31 PID 1928 wrote to memory of 1412 1928 cmd.exe 31 PID 956 wrote to memory of 1508 956 cmd.exe 32 PID 956 wrote to memory of 1508 956 cmd.exe 32 PID 956 wrote to memory of 1508 956 cmd.exe 32 PID 956 wrote to memory of 1508 956 cmd.exe 32 PID 904 wrote to memory of 1300 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 33 PID 904 wrote to memory of 1300 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 33 PID 904 wrote to memory of 1300 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 33 PID 904 wrote to memory of 1300 904 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe"C:\Users\Admin\AppData\Local\Temp\71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f3⤵
- Adds Run key to start application
PID:1412
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f3⤵
- Adds Run key to start application
PID:1508
-
-
-
C:\windows\temp\13223.exe"C:\windows\temp\13223.exe"2⤵
- Executes dropped EXE
PID:1300
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD558078dceb7bcec39cf33319b2a88af7c
SHA14d56a7f03c1f6e8a3fec218c00ce2f83efe2f678
SHA256ceade08732e58284e328de0f5fba0b9fa5dcb6fca18da209e9951fedfcd5acae
SHA512efed771e42ed6fc5e1c100ed601b9db3aa61612b79ef35be9fdc809d497ef837d6e6b73e1f0f1dbbdddedfc82a0b62a2d3ed85efeda87ca09d4f2f03f0acbe03
-
Filesize
20KB
MD558078dceb7bcec39cf33319b2a88af7c
SHA14d56a7f03c1f6e8a3fec218c00ce2f83efe2f678
SHA256ceade08732e58284e328de0f5fba0b9fa5dcb6fca18da209e9951fedfcd5acae
SHA512efed771e42ed6fc5e1c100ed601b9db3aa61612b79ef35be9fdc809d497ef837d6e6b73e1f0f1dbbdddedfc82a0b62a2d3ed85efeda87ca09d4f2f03f0acbe03
-
Filesize
20KB
MD558078dceb7bcec39cf33319b2a88af7c
SHA14d56a7f03c1f6e8a3fec218c00ce2f83efe2f678
SHA256ceade08732e58284e328de0f5fba0b9fa5dcb6fca18da209e9951fedfcd5acae
SHA512efed771e42ed6fc5e1c100ed601b9db3aa61612b79ef35be9fdc809d497ef837d6e6b73e1f0f1dbbdddedfc82a0b62a2d3ed85efeda87ca09d4f2f03f0acbe03