Analysis
-
max time kernel
49s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
10-10-2022 23:14
Static task
static1
Behavioral task
behavioral1
Sample
7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe
Resource
win10v2004-20220812-en
General
-
Target
7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe
-
Size
96KB
-
MD5
1d62f132bdbf07d74cd7b7f105c960fe
-
SHA1
9fdaa105d1663935b5e2aabe9262fcdc57e4d5fb
-
SHA256
7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371
-
SHA512
9f5d9c494da2e00784bd9bf8170ccf1051fe27ddbb47e0b2676b2375dc7e1dfe16b6501e1bacda3f7e736537134a69f5360f50acbea047e8f2965be22241592e
-
SSDEEP
1536:zSkJO8Pw84rnzGKjQr2wAsL7Ptt6BuWnXMeOalnqUVVrgC3vH:zraKtAsPP7Mu68ejkC/
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon.exe = "c:\\windows\\winlogon.exe" 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created \??\c:\windows\winlogon.exe 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe File opened for modification \??\c:\windows\winlogon.exe 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe File opened for modification C:\WINDOWS\WINLOGON.EXE 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe -
Suspicious behavior: MapViewOfSection 21 IoCs
pid Process 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeTakeOwnershipPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeRestorePrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeBackupPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeChangeNotifyPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeTakeOwnershipPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeRestorePrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeBackupPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeChangeNotifyPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeTakeOwnershipPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeRestorePrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeBackupPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeChangeNotifyPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeTakeOwnershipPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeRestorePrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeBackupPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeChangeNotifyPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeTakeOwnershipPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeRestorePrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeBackupPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeChangeNotifyPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeTakeOwnershipPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeRestorePrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeBackupPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeChangeNotifyPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeTakeOwnershipPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeRestorePrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeBackupPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeChangeNotifyPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeTakeOwnershipPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeRestorePrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeBackupPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeChangeNotifyPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeTakeOwnershipPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeRestorePrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeBackupPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeChangeNotifyPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeTakeOwnershipPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeRestorePrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeBackupPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeChangeNotifyPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeTakeOwnershipPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeRestorePrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeBackupPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeChangeNotifyPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeTakeOwnershipPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeRestorePrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeBackupPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeChangeNotifyPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeTakeOwnershipPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeRestorePrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeBackupPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeChangeNotifyPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeTakeOwnershipPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeRestorePrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeBackupPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeChangeNotifyPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeTakeOwnershipPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeRestorePrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeBackupPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeChangeNotifyPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeTakeOwnershipPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeRestorePrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe Token: SeBackupPrivilege 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1096 wrote to memory of 368 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 5 PID 1096 wrote to memory of 368 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 5 PID 1096 wrote to memory of 368 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 5 PID 1096 wrote to memory of 368 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 5 PID 1096 wrote to memory of 368 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 5 PID 1096 wrote to memory of 368 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 5 PID 1096 wrote to memory of 368 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 5 PID 1096 wrote to memory of 380 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 4 PID 1096 wrote to memory of 380 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 4 PID 1096 wrote to memory of 380 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 4 PID 1096 wrote to memory of 380 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 4 PID 1096 wrote to memory of 380 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 4 PID 1096 wrote to memory of 380 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 4 PID 1096 wrote to memory of 380 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 4 PID 1096 wrote to memory of 416 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 3 PID 1096 wrote to memory of 416 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 3 PID 1096 wrote to memory of 416 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 3 PID 1096 wrote to memory of 416 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 3 PID 1096 wrote to memory of 416 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 3 PID 1096 wrote to memory of 416 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 3 PID 1096 wrote to memory of 416 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 3 PID 1096 wrote to memory of 464 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 2 PID 1096 wrote to memory of 464 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 2 PID 1096 wrote to memory of 464 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 2 PID 1096 wrote to memory of 464 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 2 PID 1096 wrote to memory of 464 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 2 PID 1096 wrote to memory of 464 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 2 PID 1096 wrote to memory of 464 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 2 PID 1096 wrote to memory of 472 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1 PID 1096 wrote to memory of 472 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1 PID 1096 wrote to memory of 472 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1 PID 1096 wrote to memory of 472 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1 PID 1096 wrote to memory of 472 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1 PID 1096 wrote to memory of 472 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1 PID 1096 wrote to memory of 472 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 1 PID 1096 wrote to memory of 480 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 25 PID 1096 wrote to memory of 480 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 25 PID 1096 wrote to memory of 480 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 25 PID 1096 wrote to memory of 480 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 25 PID 1096 wrote to memory of 480 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 25 PID 1096 wrote to memory of 480 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 25 PID 1096 wrote to memory of 480 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 25 PID 1096 wrote to memory of 592 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 24 PID 1096 wrote to memory of 592 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 24 PID 1096 wrote to memory of 592 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 24 PID 1096 wrote to memory of 592 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 24 PID 1096 wrote to memory of 592 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 24 PID 1096 wrote to memory of 592 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 24 PID 1096 wrote to memory of 592 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 24 PID 1096 wrote to memory of 668 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 23 PID 1096 wrote to memory of 668 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 23 PID 1096 wrote to memory of 668 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 23 PID 1096 wrote to memory of 668 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 23 PID 1096 wrote to memory of 668 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 23 PID 1096 wrote to memory of 668 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 23 PID 1096 wrote to memory of 668 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 23 PID 1096 wrote to memory of 748 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 22 PID 1096 wrote to memory of 748 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 22 PID 1096 wrote to memory of 748 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 22 PID 1096 wrote to memory of 748 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 22 PID 1096 wrote to memory of 748 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 22 PID 1096 wrote to memory of 748 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 22 PID 1096 wrote to memory of 748 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 22 PID 1096 wrote to memory of 800 1096 7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe 21
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:472
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:828
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1588
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1564
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1260
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:284
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:1004
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:108
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:860
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:800
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:748
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:668
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:592
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:380
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:480
-
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:1212
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe"C:\Users\Admin\AppData\Local\Temp\7052d281cd4ea41f5436bbea5bff3f25323bd378c4ee29c04d109c6818ce6371.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1336