Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe
Resource
win10v2004-20220812-en
General
-
Target
ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe
-
Size
416KB
-
MD5
04c27cb013b9276d731d107cf13569d1
-
SHA1
d7f2dd7403613d44195d19c6b7c6e7d6db91c757
-
SHA256
ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58
-
SHA512
93e6c251f8e9af1d956566e2637746ae9577e87933ca53033ae0c35696a903fd5570e427e937f1d410267dc150ccc465f0ae2c195fd95bfd3373ec3fd0ddda8c
-
SSDEEP
12288:yDLOhQiq/baOtDO5k+XWsJQrrUmhiK2thyHRU:yDuQiqjklWhiTyHRU
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ynS4WJZ6.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" maoufo.exe -
Executes dropped EXE 7 IoCs
pid Process 1960 ynS4WJZ6.exe 1696 maoufo.exe 440 2aid.exe 1036 2aid.exe 572 3aid.exe 332 csrss.exe 1956 4aid.exe -
resource yara_rule behavioral1/memory/1036-83-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/memory/1036-85-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/memory/1036-86-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/memory/1036-90-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/memory/1036-91-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/memory/1036-98-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Loads dropped DLL 10 IoCs
pid Process 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 1960 ynS4WJZ6.exe 1960 ynS4WJZ6.exe 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /s" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /U" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /X" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /u" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /O" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /M" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /F" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /a" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /J" maoufo.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /g" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /v" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /r" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /n" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /W" maoufo.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ynS4WJZ6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /u" ynS4WJZ6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /R" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /Q" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /P" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /o" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /c" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /Z" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /G" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /x" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /C" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /y" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /T" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /z" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /b" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /w" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /q" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /S" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /Y" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /A" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /p" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /H" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /V" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /N" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /K" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /L" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /m" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /e" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /f" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /d" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /j" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /D" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /E" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /t" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /B" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /i" maoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoufo = "C:\\Users\\Admin\\maoufo.exe /k" maoufo.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created \systemroot\assembly\GAC_64\Desktop.ini csrss.exe File created \systemroot\assembly\GAC_32\Desktop.ini csrss.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 440 set thread context of 1036 440 2aid.exe 35 PID 572 set thread context of 1204 572 3aid.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1212 tasklist.exe 1192 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1960 ynS4WJZ6.exe 1960 ynS4WJZ6.exe 1036 2aid.exe 572 3aid.exe 572 3aid.exe 572 3aid.exe 1036 2aid.exe 1036 2aid.exe 1036 2aid.exe 1036 2aid.exe 1036 2aid.exe 1036 2aid.exe 1036 2aid.exe 1036 2aid.exe 1036 2aid.exe 1036 2aid.exe 1036 2aid.exe 1696 maoufo.exe 1036 2aid.exe 1696 maoufo.exe 572 3aid.exe 1696 maoufo.exe 1036 2aid.exe 1036 2aid.exe 1696 maoufo.exe 1036 2aid.exe 1696 maoufo.exe 1036 2aid.exe 1036 2aid.exe 1696 maoufo.exe 1696 maoufo.exe 1036 2aid.exe 1036 2aid.exe 1036 2aid.exe 1696 maoufo.exe 1036 2aid.exe 1696 maoufo.exe 1696 maoufo.exe 1036 2aid.exe 1036 2aid.exe 1696 maoufo.exe 1036 2aid.exe 1696 maoufo.exe 1036 2aid.exe 1036 2aid.exe 1696 maoufo.exe 1696 maoufo.exe 1696 maoufo.exe 1036 2aid.exe 1036 2aid.exe 1036 2aid.exe 1036 2aid.exe 1036 2aid.exe 1696 maoufo.exe 1036 2aid.exe 1036 2aid.exe 1696 maoufo.exe 1696 maoufo.exe 1696 maoufo.exe 1036 2aid.exe 1036 2aid.exe 1036 2aid.exe 1696 maoufo.exe 1036 2aid.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1212 tasklist.exe Token: SeDebugPrivilege 572 3aid.exe Token: SeDebugPrivilege 572 3aid.exe Token: SeDebugPrivilege 1192 tasklist.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1404 Explorer.EXE 1404 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1404 Explorer.EXE 1404 Explorer.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 1960 ynS4WJZ6.exe 1696 maoufo.exe 440 2aid.exe 1956 4aid.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 332 csrss.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1960 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 28 PID 1980 wrote to memory of 1960 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 28 PID 1980 wrote to memory of 1960 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 28 PID 1980 wrote to memory of 1960 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 28 PID 1960 wrote to memory of 1696 1960 ynS4WJZ6.exe 29 PID 1960 wrote to memory of 1696 1960 ynS4WJZ6.exe 29 PID 1960 wrote to memory of 1696 1960 ynS4WJZ6.exe 29 PID 1960 wrote to memory of 1696 1960 ynS4WJZ6.exe 29 PID 1960 wrote to memory of 1200 1960 ynS4WJZ6.exe 30 PID 1960 wrote to memory of 1200 1960 ynS4WJZ6.exe 30 PID 1960 wrote to memory of 1200 1960 ynS4WJZ6.exe 30 PID 1960 wrote to memory of 1200 1960 ynS4WJZ6.exe 30 PID 1200 wrote to memory of 1212 1200 cmd.exe 32 PID 1200 wrote to memory of 1212 1200 cmd.exe 32 PID 1200 wrote to memory of 1212 1200 cmd.exe 32 PID 1200 wrote to memory of 1212 1200 cmd.exe 32 PID 1980 wrote to memory of 440 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 34 PID 1980 wrote to memory of 440 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 34 PID 1980 wrote to memory of 440 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 34 PID 1980 wrote to memory of 440 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 34 PID 440 wrote to memory of 1036 440 2aid.exe 35 PID 440 wrote to memory of 1036 440 2aid.exe 35 PID 440 wrote to memory of 1036 440 2aid.exe 35 PID 440 wrote to memory of 1036 440 2aid.exe 35 PID 440 wrote to memory of 1036 440 2aid.exe 35 PID 440 wrote to memory of 1036 440 2aid.exe 35 PID 440 wrote to memory of 1036 440 2aid.exe 35 PID 440 wrote to memory of 1036 440 2aid.exe 35 PID 1980 wrote to memory of 572 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 36 PID 1980 wrote to memory of 572 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 36 PID 1980 wrote to memory of 572 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 36 PID 1980 wrote to memory of 572 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 36 PID 572 wrote to memory of 1404 572 3aid.exe 12 PID 572 wrote to memory of 332 572 3aid.exe 25 PID 572 wrote to memory of 1204 572 3aid.exe 37 PID 572 wrote to memory of 1204 572 3aid.exe 37 PID 572 wrote to memory of 1204 572 3aid.exe 37 PID 572 wrote to memory of 1204 572 3aid.exe 37 PID 572 wrote to memory of 1204 572 3aid.exe 37 PID 1980 wrote to memory of 1956 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 39 PID 1980 wrote to memory of 1956 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 39 PID 1980 wrote to memory of 1956 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 39 PID 1980 wrote to memory of 1956 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 39 PID 1980 wrote to memory of 932 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 40 PID 1980 wrote to memory of 932 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 40 PID 1980 wrote to memory of 932 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 40 PID 1980 wrote to memory of 932 1980 ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe 40 PID 932 wrote to memory of 1192 932 cmd.exe 42 PID 932 wrote to memory of 1192 932 cmd.exe 42 PID 932 wrote to memory of 1192 932 cmd.exe 42 PID 932 wrote to memory of 1192 932 cmd.exe 42 PID 332 wrote to memory of 872 332 csrss.exe 17
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe"C:\Users\Admin\AppData\Local\Temp\ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\ynS4WJZ6.exeC:\Users\Admin\ynS4WJZ6.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\maoufo.exe"C:\Users\Admin\maoufo.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1696
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del ynS4WJZ6.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1212
-
-
-
-
C:\Users\Admin\2aid.exeC:\Users\Admin\2aid.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\2aid.exe"C:\Users\Admin\2aid.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1036
-
-
-
C:\Users\Admin\3aid.exeC:\Users\Admin\3aid.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:1204
-
-
-
C:\Users\Admin\4aid.exeC:\Users\Admin\4aid.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1956
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del ff25ff7b8b80412ed64551e921d83b2fa0e553a7fc89769695364df9f579eb58.exe3⤵
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵PID:872
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:332
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5bfd48191f79f45416e67efe6a8f25d5d
SHA1ae31da442af2fe6ef7f960c3a50a3250baeafd8e
SHA2568271c7ff81aeb4d60ddf9b7c6c5c7e9a391324b999184f79bac6fcd411f804f5
SHA5122b2ff2c152e6ddf98d5e1043b456f080178a61413aa37a12166759a32a7b8ae98e8adcd90c76d4601c7da1334589fe93e4691e51f90dac70d74e954d06a246b8
-
Filesize
72KB
MD5bfd48191f79f45416e67efe6a8f25d5d
SHA1ae31da442af2fe6ef7f960c3a50a3250baeafd8e
SHA2568271c7ff81aeb4d60ddf9b7c6c5c7e9a391324b999184f79bac6fcd411f804f5
SHA5122b2ff2c152e6ddf98d5e1043b456f080178a61413aa37a12166759a32a7b8ae98e8adcd90c76d4601c7da1334589fe93e4691e51f90dac70d74e954d06a246b8
-
Filesize
72KB
MD5bfd48191f79f45416e67efe6a8f25d5d
SHA1ae31da442af2fe6ef7f960c3a50a3250baeafd8e
SHA2568271c7ff81aeb4d60ddf9b7c6c5c7e9a391324b999184f79bac6fcd411f804f5
SHA5122b2ff2c152e6ddf98d5e1043b456f080178a61413aa37a12166759a32a7b8ae98e8adcd90c76d4601c7da1334589fe93e4691e51f90dac70d74e954d06a246b8
-
Filesize
208KB
MD5914c8e336d83ca18bde8ec3d6dd5d852
SHA185fd8a4c0114a421d05ca78be872def090b217b8
SHA2560061ffc16cd3615e7d30f22a69d65642cb13f55a357da9f379ebe904168bbe5e
SHA512578e6b94bf576359daf96cc097c5798c9a1b8f3a47ba3f4f0707503ce32f78fafb6f0540a95f2ba311223e14be8f192468a4f3c644fe9cff9198e8ead92c0673
-
Filesize
208KB
MD5914c8e336d83ca18bde8ec3d6dd5d852
SHA185fd8a4c0114a421d05ca78be872def090b217b8
SHA2560061ffc16cd3615e7d30f22a69d65642cb13f55a357da9f379ebe904168bbe5e
SHA512578e6b94bf576359daf96cc097c5798c9a1b8f3a47ba3f4f0707503ce32f78fafb6f0540a95f2ba311223e14be8f192468a4f3c644fe9cff9198e8ead92c0673
-
Filesize
44KB
MD527ddac23e41b3aba1371229bc3114ebe
SHA170e7b60767a38a27d22b03415006c5a265fe5e93
SHA256afa5e7176ef811c85155cb18eed520d12c1bedc2c3e3e1775a197c8a687e3614
SHA512e18dc372eff827a6590c3ff9a83d428ce2fef6682b9a0ddf667489f5d148472b6f9f6239c4df68eae43c377a4c1f633c45221902044288cdbfdf20708cdd1ebd
-
Filesize
292KB
MD570795dd75771f0db3e51fb3a8cbed93c
SHA175c21ee860b9c779faa5239d4c0f40bc33db91b5
SHA25693fba1256be48a17710b87cdf2eb74307db5363f54ad62ad620cf677a4578486
SHA5120ebf363945701fec1148ebabb5a472d9ac96d89a5f3581a5f62920e69c06990cadeafa2c59e9b502c32e1aa62276dd99062e010f28aeb2d5e41d1b2bff935648
-
Filesize
292KB
MD570795dd75771f0db3e51fb3a8cbed93c
SHA175c21ee860b9c779faa5239d4c0f40bc33db91b5
SHA25693fba1256be48a17710b87cdf2eb74307db5363f54ad62ad620cf677a4578486
SHA5120ebf363945701fec1148ebabb5a472d9ac96d89a5f3581a5f62920e69c06990cadeafa2c59e9b502c32e1aa62276dd99062e010f28aeb2d5e41d1b2bff935648
-
Filesize
292KB
MD5b336ee551b4c80dde9f97aec73ea26bd
SHA1fb0be70476d28d89187b369bf73a98fb040d9c0b
SHA256a381f7f881ff01be2dda54067ea7e182044f130b7a69c339968262ec90180649
SHA5125348846868a3f257c692dda8dfd9b7ddb0a39053de8f2b521dce7964139dbd07f5a5108a2186c491a152d932da8355b98d39babeec712175d9caeb0633784a52
-
Filesize
292KB
MD5b336ee551b4c80dde9f97aec73ea26bd
SHA1fb0be70476d28d89187b369bf73a98fb040d9c0b
SHA256a381f7f881ff01be2dda54067ea7e182044f130b7a69c339968262ec90180649
SHA5125348846868a3f257c692dda8dfd9b7ddb0a39053de8f2b521dce7964139dbd07f5a5108a2186c491a152d932da8355b98d39babeec712175d9caeb0633784a52
-
Filesize
53KB
MD5d1c9e07123216e8836e7988794cd3c75
SHA1a1061c34544c9377449e186074404e0dd1009994
SHA256334bd46d5f3ba098c11827982715c0ff98e2aa1c2361b9702b222949e7e5730c
SHA51206014da3030fa66fbf64f9dd0c9c229390c93dedcb2c6f53aff810a7d0054c05c514804ea9dbae3d6ec1f13b45b4dd844a7e1ec1706e5a7ae16be8e8a760898b
-
Filesize
2KB
MD555e83789cd0307663aa66d5a0d582202
SHA185d2ffe5a7bf2f7fc43705a2bb953bc981540212
SHA256926c4cb12b70c3927068d16bcc8a16033559b01b14b28e9ac4dc08836ce4d6bc
SHA51204160134d505d8c07ecae0bbe5b904fd82bde5505368132be10ff4dc6a5965cccd00848c234575006f8b729aa322aea392fbe5a4eaf7b0aa98063fd68f3f1af8
-
Filesize
72KB
MD5bfd48191f79f45416e67efe6a8f25d5d
SHA1ae31da442af2fe6ef7f960c3a50a3250baeafd8e
SHA2568271c7ff81aeb4d60ddf9b7c6c5c7e9a391324b999184f79bac6fcd411f804f5
SHA5122b2ff2c152e6ddf98d5e1043b456f080178a61413aa37a12166759a32a7b8ae98e8adcd90c76d4601c7da1334589fe93e4691e51f90dac70d74e954d06a246b8
-
Filesize
72KB
MD5bfd48191f79f45416e67efe6a8f25d5d
SHA1ae31da442af2fe6ef7f960c3a50a3250baeafd8e
SHA2568271c7ff81aeb4d60ddf9b7c6c5c7e9a391324b999184f79bac6fcd411f804f5
SHA5122b2ff2c152e6ddf98d5e1043b456f080178a61413aa37a12166759a32a7b8ae98e8adcd90c76d4601c7da1334589fe93e4691e51f90dac70d74e954d06a246b8
-
Filesize
208KB
MD5914c8e336d83ca18bde8ec3d6dd5d852
SHA185fd8a4c0114a421d05ca78be872def090b217b8
SHA2560061ffc16cd3615e7d30f22a69d65642cb13f55a357da9f379ebe904168bbe5e
SHA512578e6b94bf576359daf96cc097c5798c9a1b8f3a47ba3f4f0707503ce32f78fafb6f0540a95f2ba311223e14be8f192468a4f3c644fe9cff9198e8ead92c0673
-
Filesize
208KB
MD5914c8e336d83ca18bde8ec3d6dd5d852
SHA185fd8a4c0114a421d05ca78be872def090b217b8
SHA2560061ffc16cd3615e7d30f22a69d65642cb13f55a357da9f379ebe904168bbe5e
SHA512578e6b94bf576359daf96cc097c5798c9a1b8f3a47ba3f4f0707503ce32f78fafb6f0540a95f2ba311223e14be8f192468a4f3c644fe9cff9198e8ead92c0673
-
Filesize
44KB
MD527ddac23e41b3aba1371229bc3114ebe
SHA170e7b60767a38a27d22b03415006c5a265fe5e93
SHA256afa5e7176ef811c85155cb18eed520d12c1bedc2c3e3e1775a197c8a687e3614
SHA512e18dc372eff827a6590c3ff9a83d428ce2fef6682b9a0ddf667489f5d148472b6f9f6239c4df68eae43c377a4c1f633c45221902044288cdbfdf20708cdd1ebd
-
Filesize
44KB
MD527ddac23e41b3aba1371229bc3114ebe
SHA170e7b60767a38a27d22b03415006c5a265fe5e93
SHA256afa5e7176ef811c85155cb18eed520d12c1bedc2c3e3e1775a197c8a687e3614
SHA512e18dc372eff827a6590c3ff9a83d428ce2fef6682b9a0ddf667489f5d148472b6f9f6239c4df68eae43c377a4c1f633c45221902044288cdbfdf20708cdd1ebd
-
Filesize
292KB
MD570795dd75771f0db3e51fb3a8cbed93c
SHA175c21ee860b9c779faa5239d4c0f40bc33db91b5
SHA25693fba1256be48a17710b87cdf2eb74307db5363f54ad62ad620cf677a4578486
SHA5120ebf363945701fec1148ebabb5a472d9ac96d89a5f3581a5f62920e69c06990cadeafa2c59e9b502c32e1aa62276dd99062e010f28aeb2d5e41d1b2bff935648
-
Filesize
292KB
MD570795dd75771f0db3e51fb3a8cbed93c
SHA175c21ee860b9c779faa5239d4c0f40bc33db91b5
SHA25693fba1256be48a17710b87cdf2eb74307db5363f54ad62ad620cf677a4578486
SHA5120ebf363945701fec1148ebabb5a472d9ac96d89a5f3581a5f62920e69c06990cadeafa2c59e9b502c32e1aa62276dd99062e010f28aeb2d5e41d1b2bff935648
-
Filesize
292KB
MD5b336ee551b4c80dde9f97aec73ea26bd
SHA1fb0be70476d28d89187b369bf73a98fb040d9c0b
SHA256a381f7f881ff01be2dda54067ea7e182044f130b7a69c339968262ec90180649
SHA5125348846868a3f257c692dda8dfd9b7ddb0a39053de8f2b521dce7964139dbd07f5a5108a2186c491a152d932da8355b98d39babeec712175d9caeb0633784a52
-
Filesize
292KB
MD5b336ee551b4c80dde9f97aec73ea26bd
SHA1fb0be70476d28d89187b369bf73a98fb040d9c0b
SHA256a381f7f881ff01be2dda54067ea7e182044f130b7a69c339968262ec90180649
SHA5125348846868a3f257c692dda8dfd9b7ddb0a39053de8f2b521dce7964139dbd07f5a5108a2186c491a152d932da8355b98d39babeec712175d9caeb0633784a52
-
Filesize
53KB
MD5d1c9e07123216e8836e7988794cd3c75
SHA1a1061c34544c9377449e186074404e0dd1009994
SHA256334bd46d5f3ba098c11827982715c0ff98e2aa1c2361b9702b222949e7e5730c
SHA51206014da3030fa66fbf64f9dd0c9c229390c93dedcb2c6f53aff810a7d0054c05c514804ea9dbae3d6ec1f13b45b4dd844a7e1ec1706e5a7ae16be8e8a760898b