Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 05:36
Static task
static1
Behavioral task
behavioral1
Sample
02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe
Resource
win10v2004-20220901-en
General
-
Target
02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe
-
Size
965KB
-
MD5
549c785be5f331099bb88475d75ae1c0
-
SHA1
2e8b701cc9f0c1deb57d7599098c740695758e11
-
SHA256
02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3
-
SHA512
f8ff86427974a0c17eb76c6e57d4badeddabcc935a9eedfcedbd8eccd6d38e8b923797e66eb4dded411b5d72f5a99c2a96df0b0550ad318636e6a598d08f6fb0
-
SSDEEP
12288:rj9l69ZU++3jUOIcr1MFNXJM44qwjxIZhKp1NplhifHW8NUnVuSIW5EykhXG5w:rDsOIcrMXP/wlIZha798NUnVPE05w
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe smrss.exe" 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe -
Executes dropped EXE 1 IoCs
pid Process 1528 12142.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\freizer = "C:\\WINDOWS\\system32\\freizer.exe" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\WINDOWS\\system32\\svchost.exe" reg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\smrss.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Windows\SysWOW64\smrss.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File created C:\WINDOWS\SysWOW64\freizer.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java-rmi.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\ktab.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\unpack200.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaws.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\servertool.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jhat.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jabswitch.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ssvagent.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\orbd.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\unpack200.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\idlj.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jdeps.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\orbd.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jp2launcher.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\pack200.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\rmiregistry.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\notification_helper.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jjs.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmc.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jvisualvm.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\native2ascii.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\rmid.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jp2launcher.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaws.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaw.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\kinit.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\pack200.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\servertool.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\xjc.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java-rmi.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\servertool.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jjs.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\tnameserv.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javaws.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jar.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\wsimport.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\keytool.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\klist.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\policytool.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX45.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\java-rmi.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPPREARM.EXE 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javap.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmid.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\ktab.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\orbd.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javacpl.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.Loader.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\wsgen.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\rmid.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\svchost.exe 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5100 wrote to memory of 4984 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 84 PID 5100 wrote to memory of 4984 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 84 PID 5100 wrote to memory of 4984 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 84 PID 5100 wrote to memory of 5088 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 82 PID 5100 wrote to memory of 5088 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 82 PID 5100 wrote to memory of 5088 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 82 PID 4984 wrote to memory of 4808 4984 cmd.exe 87 PID 4984 wrote to memory of 4808 4984 cmd.exe 87 PID 4984 wrote to memory of 4808 4984 cmd.exe 87 PID 5088 wrote to memory of 636 5088 cmd.exe 86 PID 5088 wrote to memory of 636 5088 cmd.exe 86 PID 5088 wrote to memory of 636 5088 cmd.exe 86 PID 5100 wrote to memory of 1528 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 88 PID 5100 wrote to memory of 1528 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 88 PID 5100 wrote to memory of 1528 5100 02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe"C:\Users\Admin\AppData\Local\Temp\02042e0dd1a0a9a0f1975c89a8a28a353b5ae8a09710c2b40c3acc5b919171e3.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f3⤵
- Adds Run key to start application
PID:636
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f3⤵
- Adds Run key to start application
PID:4808
-
-
-
C:\windows\temp\12142.exe"C:\windows\temp\12142.exe"2⤵
- Executes dropped EXE
PID:1528
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5a8ef50ede1254a4d946de85b34aadb55
SHA121303951331992e4933622ae43f0c86d8f162a85
SHA2565b1640fcd03919113e7d702de7ad3b40810880803e9f9b14717d24617b57f8ee
SHA512fab6c11c3f6d0179cd37d74218fb3b52195e0d1ecdf55ae4c44fc45969315d1d26dcb6e4e45e353254d4083ca6ffaffe5c3bfaf0f789d782bf75848da2856980
-
Filesize
184KB
MD5a8ef50ede1254a4d946de85b34aadb55
SHA121303951331992e4933622ae43f0c86d8f162a85
SHA2565b1640fcd03919113e7d702de7ad3b40810880803e9f9b14717d24617b57f8ee
SHA512fab6c11c3f6d0179cd37d74218fb3b52195e0d1ecdf55ae4c44fc45969315d1d26dcb6e4e45e353254d4083ca6ffaffe5c3bfaf0f789d782bf75848da2856980