Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 20:01
Static task
static1
Behavioral task
behavioral1
Sample
71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe
Resource
win10v2004-20220901-en
General
-
Target
71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe
-
Size
829KB
-
MD5
02b00feab59fb4a9f53a374e2bb856c0
-
SHA1
68caef5e829c036a4144fb6b5190d728e646d6e5
-
SHA256
71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591
-
SHA512
756f34000b1ce232c73d893e045d59941d5755283e5c7a77e20d8192e7761776dbb4e20d43cad48c7c932e26662b4abe09d29822cad2dd2b1ebaa5f15f55f001
-
SSDEEP
6144:a+nglw9ayQv3ahvyn/PU7O0KXgTTSjyEN2ERBOzllz5jtGvA4q1jtGvA4qMVhVK:rjS3Yvyn/0Tvlzq44qW44qMVhVK
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe smrss.exe" 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe -
Executes dropped EXE 1 IoCs
pid Process 3908 13223.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\WINDOWS\\system32\\svchost.exe" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\freizer = "C:\\WINDOWS\\system32\\freizer.exe" reg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\smrss.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Windows\SysWOW64\smrss.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File created C:\WINDOWS\SysWOW64\freizer.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jvisualvm.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jabswitch.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java-rmi.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\klist.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\notification_helper.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jinfo.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\excelcnv.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msotd.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\schemagen.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jcmd.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jrunscript.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\tnameserv.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\unpack200.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\rmid.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\unpack200.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\servertool.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\pack200.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\policytool.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX45.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\ktab.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmid.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVLP.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jconsole.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jp2launcher.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\tnameserv.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ktab.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\servertool.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\unpack200.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoev.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\kinit.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\pack200.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\keytool.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\policytool.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\tnameserv.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\keytool.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\rmiregistry.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoadfsb.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOUC.EXE 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jabswitch.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\policytool.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\klist.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstatd.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaws.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jabswitch.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmiregistry.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\orbd.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ORGCHART.EXE 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\svchost.exe 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2348 wrote to memory of 5076 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 84 PID 2348 wrote to memory of 5076 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 84 PID 2348 wrote to memory of 5076 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 84 PID 2348 wrote to memory of 4568 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 85 PID 2348 wrote to memory of 4568 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 85 PID 2348 wrote to memory of 4568 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 85 PID 5076 wrote to memory of 340 5076 cmd.exe 89 PID 5076 wrote to memory of 340 5076 cmd.exe 89 PID 5076 wrote to memory of 340 5076 cmd.exe 89 PID 4568 wrote to memory of 3976 4568 cmd.exe 88 PID 4568 wrote to memory of 3976 4568 cmd.exe 88 PID 4568 wrote to memory of 3976 4568 cmd.exe 88 PID 2348 wrote to memory of 3908 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 90 PID 2348 wrote to memory of 3908 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 90 PID 2348 wrote to memory of 3908 2348 71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe"C:\Users\Admin\AppData\Local\Temp\71fd652c5311781232c846e751edf0a014b69f2bdf9b3ac78d70e20534493591.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f3⤵
- Adds Run key to start application
PID:340
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f3⤵
- Adds Run key to start application
PID:3976
-
-
-
C:\windows\temp\13223.exe"C:\windows\temp\13223.exe"2⤵
- Executes dropped EXE
PID:3908
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD558078dceb7bcec39cf33319b2a88af7c
SHA14d56a7f03c1f6e8a3fec218c00ce2f83efe2f678
SHA256ceade08732e58284e328de0f5fba0b9fa5dcb6fca18da209e9951fedfcd5acae
SHA512efed771e42ed6fc5e1c100ed601b9db3aa61612b79ef35be9fdc809d497ef837d6e6b73e1f0f1dbbdddedfc82a0b62a2d3ed85efeda87ca09d4f2f03f0acbe03
-
Filesize
20KB
MD558078dceb7bcec39cf33319b2a88af7c
SHA14d56a7f03c1f6e8a3fec218c00ce2f83efe2f678
SHA256ceade08732e58284e328de0f5fba0b9fa5dcb6fca18da209e9951fedfcd5acae
SHA512efed771e42ed6fc5e1c100ed601b9db3aa61612b79ef35be9fdc809d497ef837d6e6b73e1f0f1dbbdddedfc82a0b62a2d3ed85efeda87ca09d4f2f03f0acbe03