Analysis
-
max time kernel
151s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2022 11:24
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
General
-
Target
file.exe
-
Size
276KB
-
MD5
8a16ba45656454f73c16169a88d867fd
-
SHA1
cbd09b4d43c2acf42c87d9a6554fc7287d2cf52f
-
SHA256
94a24841df9e30fab797665446d3ebbf9af6c8157a99d4c3f7afbe64d58777c6
-
SHA512
de459bfe8839ab647921fb1d6a8e97fafa99a8f56d6e79ca50665c962f4e4751c2c7fda71e5e30b36c5780b6cbded1590775cd1ccea804891cbeaa270b98df43
-
SSDEEP
6144:sFV1oU2xqOUjJn3CP4XI5obljmGrwVfquS:sFgU28OUSh+dd
Malware Config
Extracted
danabot
192.236.233.188:443
192.119.70.159:443
23.106.124.171:443
213.227.155.103:443
-
embedded_hash
56951C922035D696BFCE443750496462
-
type
loader
Extracted
systembc
45.182.189.231:443
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2620-133-0x0000000000590000-0x0000000000599000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 80 68 rundll32.exe 82 4716 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
1CB0.exeD3FA.exejjtxr.exepid process 3360 1CB0.exe 4396 D3FA.exe 1548 jjtxr.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1CB0.exedescription pid process target process PID 3360 set thread context of 4716 3360 1CB0.exe rundll32.exe -
Drops file in Windows directory 2 IoCs
Processes:
D3FA.exedescription ioc process File created C:\Windows\Tasks\jjtxr.job D3FA.exe File opened for modification C:\Windows\Tasks\jjtxr.job D3FA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 6 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 944 3360 WerFault.exe 1CB0.exe 3852 3360 WerFault.exe 1CB0.exe 3956 3360 WerFault.exe 1CB0.exe 2424 3360 WerFault.exe 1CB0.exe 1372 3360 WerFault.exe 1CB0.exe 1392 3360 WerFault.exe 1CB0.exe -
Checks SCSI registry key(s) 3 TTPs 39 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exefile.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe -
Checks processor information in registry 2 TTPs 50 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
1CB0.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision 1CB0.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 1CB0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 1CB0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 1CB0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString 1CB0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information 1CB0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1CB0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet 1CB0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 1CB0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier 1CB0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision 1CB0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information 1CB0.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 1CB0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet 1CB0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision 1CB0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1CB0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 1CB0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision 1CB0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data 1CB0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status 1CB0.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 1CB0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 1CB0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status 1CB0.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1CB0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 1CB0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data 1CB0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier 1CB0.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe -
Processes:
description ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Toolbar Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser -
Modifies registry class 19 IoCs
Processes:
rundll32.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
pid process 600 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
file.exepid process 2620 file.exe 2620 file.exe 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 600 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
file.exepid process 2620 file.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
Processes:
svchost.exedescription pid process Token: SeShutdownPrivilege 3844 svchost.exe Token: SeShutdownPrivilege 3844 svchost.exe Token: SeCreatePagefilePrivilege 3844 svchost.exe Token: SeShutdownPrivilege 600 Token: SeCreatePagefilePrivilege 600 Token: SeShutdownPrivilege 600 Token: SeCreatePagefilePrivilege 600 Token: SeShutdownPrivilege 600 Token: SeCreatePagefilePrivilege 600 Token: SeShutdownPrivilege 600 Token: SeCreatePagefilePrivilege 600 Token: SeShutdownPrivilege 600 Token: SeCreatePagefilePrivilege 600 Token: SeShutdownPrivilege 600 Token: SeCreatePagefilePrivilege 600 Token: SeShutdownPrivilege 600 Token: SeCreatePagefilePrivilege 600 Token: SeShutdownPrivilege 600 Token: SeCreatePagefilePrivilege 600 Token: SeShutdownPrivilege 600 Token: SeCreatePagefilePrivilege 600 Token: SeShutdownPrivilege 600 Token: SeCreatePagefilePrivilege 600 Token: SeShutdownPrivilege 600 Token: SeCreatePagefilePrivilege 600 Token: SeShutdownPrivilege 600 Token: SeCreatePagefilePrivilege 600 Token: SeShutdownPrivilege 600 Token: SeCreatePagefilePrivilege 600 Token: SeShutdownPrivilege 600 Token: SeCreatePagefilePrivilege 600 Token: SeShutdownPrivilege 600 Token: SeCreatePagefilePrivilege 600 Token: SeShutdownPrivilege 600 Token: SeCreatePagefilePrivilege 600 Token: SeShutdownPrivilege 600 Token: SeCreatePagefilePrivilege 600 -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
rundll32.exepid process 4716 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
pid process 600 600 -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
1CB0.exedescription pid process target process PID 600 wrote to memory of 3360 600 1CB0.exe PID 600 wrote to memory of 3360 600 1CB0.exe PID 600 wrote to memory of 3360 600 1CB0.exe PID 3360 wrote to memory of 3564 3360 1CB0.exe agentactivationruntimestarter.exe PID 3360 wrote to memory of 3564 3360 1CB0.exe agentactivationruntimestarter.exe PID 3360 wrote to memory of 3564 3360 1CB0.exe agentactivationruntimestarter.exe PID 600 wrote to memory of 4396 600 D3FA.exe PID 600 wrote to memory of 4396 600 D3FA.exe PID 600 wrote to memory of 4396 600 D3FA.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 68 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 4716 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 4716 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 4716 3360 1CB0.exe rundll32.exe PID 3360 wrote to memory of 4716 3360 1CB0.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\1CB0.exeC:\Users\Admin\AppData\Local\Temp\1CB0.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\agentactivationruntimestarter.exeC:\Windows\system32\agentactivationruntimestarter.exe2⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 6202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 8802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 9442⤵
- Program crash
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 9442⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 10882⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 10962⤵
- Program crash
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x434 0x2d01⤵
-
C:\Users\Admin\AppData\Local\Temp\D3FA.exeC:\Users\Admin\AppData\Local\Temp\D3FA.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\ProgramData\lmeq\jjtxr.exeC:\ProgramData\lmeq\jjtxr.exe start1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3360 -ip 33601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3360 -ip 33601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3360 -ip 33601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3360 -ip 33601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3360 -ip 33601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3360 -ip 33601⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\lmeq\jjtxr.exeFilesize
276KB
MD5d66be42ac16824299b55cdee82364d6f
SHA12e45e3ea10a9ee00fd3d495e15cef4cf8ca8f4d0
SHA2562354b336950524c3f8800bf7f7e812866a64275f8eb590c68e88834ea0f7fb6b
SHA512bc6ff2c7e5b36874513f0a8803a6346041bacd6f8bb52c932b25d7dba2f571106250ddef26cc9ee2b45ebe299c94051427c5edd511ea5efc5cfcf3cd675c90c5
-
C:\ProgramData\lmeq\jjtxr.exeFilesize
276KB
MD5d66be42ac16824299b55cdee82364d6f
SHA12e45e3ea10a9ee00fd3d495e15cef4cf8ca8f4d0
SHA2562354b336950524c3f8800bf7f7e812866a64275f8eb590c68e88834ea0f7fb6b
SHA512bc6ff2c7e5b36874513f0a8803a6346041bacd6f8bb52c932b25d7dba2f571106250ddef26cc9ee2b45ebe299c94051427c5edd511ea5efc5cfcf3cd675c90c5
-
C:\Users\Admin\AppData\Local\Temp\1CB0.exeFilesize
1.3MB
MD5542994bb707e825fce92a1c80de5c1de
SHA16c5a8fd8d0e74a46ba377870c3ca79de96091edd
SHA256f9642f4cd784385d050bef551549507dc8cc295fcd14c62c1c16ba9e11174b0e
SHA51272cc54bd47ac2b41904761d24b9071614bef33236123da2ba3b71fc509a167ad042e4ce42d68296616b75a761ab6b0a6ae715aeed733305f5c4fd0fb06d6aa2f
-
C:\Users\Admin\AppData\Local\Temp\1CB0.exeFilesize
1.3MB
MD5542994bb707e825fce92a1c80de5c1de
SHA16c5a8fd8d0e74a46ba377870c3ca79de96091edd
SHA256f9642f4cd784385d050bef551549507dc8cc295fcd14c62c1c16ba9e11174b0e
SHA51272cc54bd47ac2b41904761d24b9071614bef33236123da2ba3b71fc509a167ad042e4ce42d68296616b75a761ab6b0a6ae715aeed733305f5c4fd0fb06d6aa2f
-
C:\Users\Admin\AppData\Local\Temp\D3FA.exeFilesize
276KB
MD5d66be42ac16824299b55cdee82364d6f
SHA12e45e3ea10a9ee00fd3d495e15cef4cf8ca8f4d0
SHA2562354b336950524c3f8800bf7f7e812866a64275f8eb590c68e88834ea0f7fb6b
SHA512bc6ff2c7e5b36874513f0a8803a6346041bacd6f8bb52c932b25d7dba2f571106250ddef26cc9ee2b45ebe299c94051427c5edd511ea5efc5cfcf3cd675c90c5
-
C:\Users\Admin\AppData\Local\Temp\D3FA.exeFilesize
276KB
MD5d66be42ac16824299b55cdee82364d6f
SHA12e45e3ea10a9ee00fd3d495e15cef4cf8ca8f4d0
SHA2562354b336950524c3f8800bf7f7e812866a64275f8eb590c68e88834ea0f7fb6b
SHA512bc6ff2c7e5b36874513f0a8803a6346041bacd6f8bb52c932b25d7dba2f571106250ddef26cc9ee2b45ebe299c94051427c5edd511ea5efc5cfcf3cd675c90c5
-
C:\Users\Admin\AppData\Local\Temp\Sepawuaopqtypsq.tmpFilesize
3.3MB
MD58b9c0f72deaf2ee06e7441209cbe4ffb
SHA134912f3c7f4285d85497c96e95c33e5d6a597c97
SHA2561e7242ac7c025b87636e59c07e3601f1bbf5894ce0b23709405b6fefbca4dabe
SHA512db8fb980b6331f494fea8dd4adf6d8724c9ad1a7a2048c6d91e49d9e81fc83700c1195854efc5dcbe2b3aef8d94b5f0ddd7ae8910f40b9cdab017e381f855cd7
-
memory/68-162-0x00000000005B0000-0x00000000005B4000-memory.dmpFilesize
16KB
-
memory/68-157-0x0000000000000000-mapping.dmp
-
memory/68-171-0x0000000000830000-0x0000000000834000-memory.dmpFilesize
16KB
-
memory/68-165-0x00000000005E0000-0x00000000005E4000-memory.dmpFilesize
16KB
-
memory/68-166-0x00000000005F0000-0x00000000005F4000-memory.dmpFilesize
16KB
-
memory/68-167-0x0000000000800000-0x0000000000804000-memory.dmpFilesize
16KB
-
memory/68-168-0x0000000000810000-0x0000000000814000-memory.dmpFilesize
16KB
-
memory/68-169-0x0000000000820000-0x0000000000824000-memory.dmpFilesize
16KB
-
memory/68-170-0x0000000000830000-0x0000000000834000-memory.dmpFilesize
16KB
-
memory/68-164-0x00000000005D0000-0x00000000005D4000-memory.dmpFilesize
16KB
-
memory/68-163-0x00000000005C0000-0x00000000005C4000-memory.dmpFilesize
16KB
-
memory/68-161-0x00000000005A0000-0x00000000005A4000-memory.dmpFilesize
16KB
-
memory/68-159-0x0000000000580000-0x0000000000584000-memory.dmpFilesize
16KB
-
memory/68-160-0x0000000000590000-0x0000000000594000-memory.dmpFilesize
16KB
-
memory/68-158-0x0000000000570000-0x0000000000574000-memory.dmpFilesize
16KB
-
memory/1548-154-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/1548-153-0x0000000000772000-0x0000000000782000-memory.dmpFilesize
64KB
-
memory/2620-135-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/2620-133-0x0000000000590000-0x0000000000599000-memory.dmpFilesize
36KB
-
memory/2620-132-0x00000000007B7000-0x00000000007C7000-memory.dmpFilesize
64KB
-
memory/2620-134-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/3360-182-0x0000000003E30000-0x0000000003F70000-memory.dmpFilesize
1.2MB
-
memory/3360-177-0x0000000003E30000-0x0000000003F70000-memory.dmpFilesize
1.2MB
-
memory/3360-136-0x0000000000000000-mapping.dmp
-
memory/3360-193-0x0000000003130000-0x0000000003BF3000-memory.dmpFilesize
10.8MB
-
memory/3360-192-0x0000000000400000-0x00000000006CE000-memory.dmpFilesize
2.8MB
-
memory/3360-184-0x0000000003E30000-0x0000000003F70000-memory.dmpFilesize
1.2MB
-
memory/3360-183-0x0000000003E30000-0x0000000003F70000-memory.dmpFilesize
1.2MB
-
memory/3360-144-0x0000000000400000-0x00000000006CE000-memory.dmpFilesize
2.8MB
-
memory/3360-143-0x00000000024D0000-0x0000000002792000-memory.dmpFilesize
2.8MB
-
memory/3360-142-0x0000000000400000-0x00000000006CE000-memory.dmpFilesize
2.8MB
-
memory/3360-140-0x00000000024D0000-0x0000000002792000-memory.dmpFilesize
2.8MB
-
memory/3360-139-0x0000000000C07000-0x0000000000D25000-memory.dmpFilesize
1.1MB
-
memory/3360-156-0x0000000000400000-0x00000000006CE000-memory.dmpFilesize
2.8MB
-
memory/3360-173-0x0000000003130000-0x0000000003BF3000-memory.dmpFilesize
10.8MB
-
memory/3360-174-0x0000000003130000-0x0000000003BF3000-memory.dmpFilesize
10.8MB
-
memory/3360-175-0x0000000003130000-0x0000000003BF3000-memory.dmpFilesize
10.8MB
-
memory/3360-176-0x0000000003E30000-0x0000000003F70000-memory.dmpFilesize
1.2MB
-
memory/3360-155-0x0000000000400000-0x00000000006CE000-memory.dmpFilesize
2.8MB
-
memory/3360-178-0x0000000003E30000-0x0000000003F70000-memory.dmpFilesize
1.2MB
-
memory/3360-180-0x0000000000400000-0x00000000006CE000-memory.dmpFilesize
2.8MB
-
memory/3360-179-0x0000000003E30000-0x0000000003F70000-memory.dmpFilesize
1.2MB
-
memory/3360-181-0x0000000003E30000-0x0000000003F70000-memory.dmpFilesize
1.2MB
-
memory/3564-141-0x0000000000000000-mapping.dmp
-
memory/4396-150-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/4396-145-0x0000000000000000-mapping.dmp
-
memory/4396-148-0x0000000000737000-0x0000000000747000-memory.dmpFilesize
64KB
-
memory/4396-149-0x0000000000560000-0x0000000000569000-memory.dmpFilesize
36KB
-
memory/4716-185-0x0000000000000000-mapping.dmp
-
memory/4716-186-0x0000000002980000-0x0000000003443000-memory.dmpFilesize
10.8MB
-
memory/4716-187-0x0000000003510000-0x0000000003650000-memory.dmpFilesize
1.2MB
-
memory/4716-188-0x0000000003510000-0x0000000003650000-memory.dmpFilesize
1.2MB
-
memory/4716-189-0x0000000000600000-0x0000000000FA4000-memory.dmpFilesize
9.6MB
-
memory/4716-190-0x0000000002980000-0x0000000003443000-memory.dmpFilesize
10.8MB
-
memory/4716-191-0x0000000002980000-0x0000000003443000-memory.dmpFilesize
10.8MB