Analysis
-
max time kernel
93s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 11:33
Behavioral task
behavioral1
Sample
e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe
Resource
win10v2004-20220812-en
General
-
Target
e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe
-
Size
584KB
-
MD5
11a2f493604e36030ce9d0ccb4487ae0
-
SHA1
e39e9e619185b8873cb9179231cb59b25be0f9f3
-
SHA256
e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916
-
SHA512
1188f7802dba3f1712938840e0f85424812cb890f9e0b8d089e839ccb33068d81f99d36228b75e7bdcbe0cd1034ccf68b0295711ac7d799eba17ffc30efc1894
-
SSDEEP
12288:frxC+a9jEXiDcu4nalJRdgHZoEXRs/4v+o:frE9jEy76KP6vhs/I+
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0008000000022e6c-135.dat aspack_v212_v242 behavioral2/files/0x0008000000022e6c-136.dat aspack_v212_v242 behavioral2/files/0x000300000000071f-140.dat aspack_v212_v242 behavioral2/files/0x000300000000071f-142.dat aspack_v212_v242 behavioral2/files/0x0006000000009dc2-146.dat aspack_v212_v242 behavioral2/files/0x0006000000009dc2-147.dat aspack_v212_v242 behavioral2/files/0x0005000000009dc6-154.dat aspack_v212_v242 behavioral2/files/0x0005000000009dc6-153.dat aspack_v212_v242 behavioral2/files/0x0006000000009dcc-158.dat aspack_v212_v242 behavioral2/files/0x000400000000a3be-159.dat aspack_v212_v242 behavioral2/files/0x000400000001629d-160.dat aspack_v212_v242 behavioral2/files/0x000400000000a3be-162.dat aspack_v212_v242 behavioral2/files/0x0006000000009dcc-161.dat aspack_v212_v242 behavioral2/files/0x000400000001629d-169.dat aspack_v212_v242 behavioral2/files/0x00070000000162a7-172.dat aspack_v212_v242 behavioral2/files/0x00070000000162a7-174.dat aspack_v212_v242 behavioral2/files/0x00050000000162ad-178.dat aspack_v212_v242 behavioral2/files/0x00050000000162ad-177.dat aspack_v212_v242 behavioral2/files/0x000200000001e85f-183.dat aspack_v212_v242 behavioral2/files/0x000200000001e85f-184.dat aspack_v212_v242 behavioral2/files/0x000500000001e9db-188.dat aspack_v212_v242 behavioral2/files/0x000200000001e9dc-189.dat aspack_v212_v242 behavioral2/files/0x000500000001e9db-190.dat aspack_v212_v242 behavioral2/files/0x000200000001e9dc-191.dat aspack_v212_v242 behavioral2/files/0x0002000000022b51-199.dat aspack_v212_v242 behavioral2/files/0x0002000000022b51-198.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 392 09c00787.exe -
Sets DLL path for service in the registry 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NWCWorkstation\Parameters\ServiceDll = "C:\\Windows\\system32\\NWCWorkstation.dll" 09c00787.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SRService\Parameters\ServiceDll = "C:\\Windows\\system32\\SRService.dll" 09c00787.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Wmi\Parameters\ServiceDll = "C:\\Windows\\system32\\Wmi.dll" 09c00787.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WmdmPmSp\Parameters\ServiceDll = "C:\\Windows\\system32\\WmdmPmSp.dll" 09c00787.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 09c00787.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nla\Parameters\ServiceDll = "C:\\Windows\\system32\\Nla.dll" 09c00787.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ntmssvc\Parameters\ServiceDll = "C:\\Windows\\system32\\Ntmssvc.dll" 09c00787.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nwsapagent\Parameters\ServiceDll = "C:\\Windows\\system32\\Nwsapagent.dll" 09c00787.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\LogonHours\Parameters\ServiceDll = "C:\\Windows\\system32\\LogonHours.dll" 09c00787.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PCAudit\Parameters\ServiceDll = "C:\\Windows\\system32\\PCAudit.dll" 09c00787.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ias\Parameters\ServiceDll = "C:\\Windows\\system32\\Ias.dll" 09c00787.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\Irmon.dll" 09c00787.exe -
resource yara_rule behavioral2/memory/744-132-0x0000000000270000-0x000000000030A000-memory.dmp upx behavioral2/memory/744-133-0x0000000000270000-0x000000000030A000-memory.dmp upx behavioral2/files/0x0008000000022e6c-135.dat upx behavioral2/files/0x0008000000022e6c-136.dat upx behavioral2/memory/392-137-0x0000000000410000-0x000000000045E000-memory.dmp upx behavioral2/memory/392-138-0x0000000000410000-0x000000000045E000-memory.dmp upx behavioral2/memory/392-139-0x0000000000410000-0x000000000045E000-memory.dmp upx behavioral2/files/0x000300000000071f-140.dat upx behavioral2/files/0x000300000000071f-142.dat upx behavioral2/memory/2388-143-0x00000000743C0000-0x000000007440E000-memory.dmp upx behavioral2/memory/2388-144-0x00000000743C0000-0x000000007440E000-memory.dmp upx behavioral2/memory/2388-145-0x00000000743C0000-0x000000007440E000-memory.dmp upx behavioral2/files/0x0006000000009dc2-146.dat upx behavioral2/files/0x0006000000009dc2-147.dat upx behavioral2/memory/2536-150-0x00000000743C0000-0x000000007440E000-memory.dmp upx behavioral2/memory/2536-149-0x00000000743C0000-0x000000007440E000-memory.dmp upx behavioral2/memory/2536-151-0x00000000743C0000-0x000000007440E000-memory.dmp upx behavioral2/memory/408-157-0x00000000743C0000-0x000000007440E000-memory.dmp upx behavioral2/memory/408-156-0x00000000743C0000-0x000000007440E000-memory.dmp upx behavioral2/memory/408-155-0x00000000743C0000-0x000000007440E000-memory.dmp upx behavioral2/files/0x0005000000009dc6-154.dat upx behavioral2/files/0x0005000000009dc6-153.dat upx behavioral2/files/0x0006000000009dcc-158.dat upx behavioral2/files/0x000400000000a3be-159.dat upx behavioral2/files/0x000400000001629d-160.dat upx behavioral2/files/0x000400000000a3be-162.dat upx behavioral2/memory/4256-164-0x00000000743C0000-0x000000007440E000-memory.dmp upx behavioral2/memory/4256-166-0x00000000743C0000-0x000000007440E000-memory.dmp upx behavioral2/memory/4256-167-0x00000000743C0000-0x000000007440E000-memory.dmp upx behavioral2/memory/3708-168-0x0000000074370000-0x00000000743BE000-memory.dmp upx behavioral2/memory/3708-165-0x0000000074370000-0x00000000743BE000-memory.dmp upx behavioral2/memory/3708-163-0x0000000074370000-0x00000000743BE000-memory.dmp upx behavioral2/files/0x0006000000009dcc-161.dat upx behavioral2/files/0x000400000001629d-169.dat upx behavioral2/memory/1828-173-0x00000000743C0000-0x000000007440E000-memory.dmp upx behavioral2/files/0x00070000000162a7-172.dat upx behavioral2/memory/1828-171-0x00000000743C0000-0x000000007440E000-memory.dmp upx behavioral2/memory/1828-170-0x00000000743C0000-0x000000007440E000-memory.dmp upx behavioral2/files/0x00070000000162a7-174.dat upx behavioral2/memory/2008-175-0x00000000743C0000-0x000000007440E000-memory.dmp upx behavioral2/memory/2008-176-0x00000000743C0000-0x000000007440E000-memory.dmp upx behavioral2/files/0x00050000000162ad-178.dat upx behavioral2/memory/2008-181-0x00000000743C0000-0x000000007440E000-memory.dmp upx behavioral2/memory/4348-182-0x0000000074370000-0x00000000743BE000-memory.dmp upx behavioral2/memory/4348-180-0x0000000074370000-0x00000000743BE000-memory.dmp upx behavioral2/memory/4348-179-0x0000000074370000-0x00000000743BE000-memory.dmp upx behavioral2/files/0x00050000000162ad-177.dat upx behavioral2/files/0x000200000001e85f-183.dat upx behavioral2/memory/4316-185-0x0000000073A20000-0x0000000073A6E000-memory.dmp upx behavioral2/memory/4316-186-0x0000000073A20000-0x0000000073A6E000-memory.dmp upx behavioral2/files/0x000200000001e85f-184.dat upx behavioral2/memory/4316-187-0x0000000073A20000-0x0000000073A6E000-memory.dmp upx behavioral2/files/0x000500000001e9db-188.dat upx behavioral2/files/0x000200000001e9dc-189.dat upx behavioral2/files/0x000500000001e9db-190.dat upx behavioral2/files/0x000200000001e9dc-191.dat upx behavioral2/memory/1248-193-0x0000000073A20000-0x0000000073A6E000-memory.dmp upx behavioral2/memory/3720-196-0x00000000739B0000-0x00000000739FE000-memory.dmp upx behavioral2/memory/3720-195-0x00000000739B0000-0x00000000739FE000-memory.dmp upx behavioral2/memory/1248-197-0x0000000073A20000-0x0000000073A6E000-memory.dmp upx behavioral2/memory/1248-194-0x0000000073A20000-0x0000000073A6E000-memory.dmp upx behavioral2/memory/3720-192-0x00000000739B0000-0x00000000739FE000-memory.dmp upx behavioral2/memory/1128-202-0x0000000073A20000-0x0000000073A6E000-memory.dmp upx behavioral2/memory/1128-201-0x0000000073A20000-0x0000000073A6E000-memory.dmp upx -
Loads dropped DLL 9 IoCs
pid Process 2388 svchost.exe 2536 svchost.exe 408 svchost.exe 4256 svchost.exe 3708 svchost.exe 1828 svchost.exe 2008 svchost.exe 4348 svchost.exe 4316 svchost.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Ias.dll 09c00787.exe File opened for modification C:\Windows\SysWOW64\Nla.dll 09c00787.exe File opened for modification C:\Windows\SysWOW64\NWCWorkstation.dll 09c00787.exe File opened for modification C:\Windows\SysWOW64\SRService.dll 09c00787.exe File opened for modification C:\Windows\SysWOW64\Wmi.dll 09c00787.exe File opened for modification C:\Windows\SysWOW64\LogonHours.dll 09c00787.exe File opened for modification C:\Windows\SysWOW64\PCAudit.dll 09c00787.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 09c00787.exe File opened for modification C:\Windows\SysWOW64\Irmon.dll 09c00787.exe File opened for modification C:\Windows\SysWOW64\Ntmssvc.dll 09c00787.exe File opened for modification C:\Windows\SysWOW64\Nwsapagent.dll 09c00787.exe File opened for modification C:\Windows\SysWOW64\WmdmPmSp.dll 09c00787.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 392 09c00787.exe 392 09c00787.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 744 wrote to memory of 392 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 84 PID 744 wrote to memory of 392 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 84 PID 744 wrote to memory of 392 744 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe"C:\Users\Admin\AppData\Local\Temp\e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:744 -
C:\09c00787.exeC:\09c00787.exe2⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:392
-
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\S58XVZL8\QQBrowserSetup[1].exeC:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\S58XVZL8\QQBrowserSetup[1].exe2⤵PID:1880
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
PID:2388
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Irmon1⤵
- Loads dropped DLL
PID:2536
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nla1⤵
- Loads dropped DLL
PID:408
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Ntmssvc1⤵
- Loads dropped DLL
PID:4256
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s NWCWorkstation1⤵
- Loads dropped DLL
PID:3708
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nwsapagent1⤵
- Loads dropped DLL
PID:1828
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s SRService1⤵
- Loads dropped DLL
PID:2008
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s WmdmPmSp1⤵
- Loads dropped DLL
PID:4348
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s LogonHours1⤵
- Loads dropped DLL
PID:4316
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s PCAudit1⤵PID:1248
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s helpsvc1⤵PID:3720
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s uploadmgr1⤵PID:1128
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5d5dbb416cc6ab7b22b8af372459e0d27
SHA1228fbbee6c621794f98442bf2bc1a557f982a333
SHA2567a19f3e148632551c6a26ef79d349fb6474d80ec9337e001da56ffd0d7ea7d37
SHA51232c89df85d1e7df6b62643d89225542eee6a2cf3a13fc4dea779adb66baf188396bac829fc821498081166b530fdbc79fbb903d612baefcbc5496222b4d192d7
-
Filesize
240KB
MD5d5dbb416cc6ab7b22b8af372459e0d27
SHA1228fbbee6c621794f98442bf2bc1a557f982a333
SHA2567a19f3e148632551c6a26ef79d349fb6474d80ec9337e001da56ffd0d7ea7d37
SHA51232c89df85d1e7df6b62643d89225542eee6a2cf3a13fc4dea779adb66baf188396bac829fc821498081166b530fdbc79fbb903d612baefcbc5496222b4d192d7
-
Filesize
10.4MB
MD5ad98fc3eda02fc26f09fc9e0ebbac1a8
SHA1a95cde4beb8a953a3d07d20a156212ab1d11d259
SHA25623044a25d4dbc20333bfd6fc8e64c642b70e677592ff287299108a41a485236d
SHA512b0a5666d9645bda72e1d0a2c2a533446b203a55d8cad2c08cc24c8ea2b4230862b99915951d27fc06ed366a0b34a5a311ddbb5931146f0379f80e7e04208531d
-
Filesize
11.6MB
MD5ab14548a8fe90d03c14aea6ecf22ac0d
SHA144697b7f24276d02154c01414ed216269988ecff
SHA256c2771b5328c77adb57f2c6bc53a91dc1b33f3101030d0a4ac5c1464e5f0e8ed2
SHA51215ac79a7248bf6d2dc4dd954f3f8f4868e33d463a49327653a0a49b1cf1c7dbd472f5116ba7ecb8f6bb6d0c29614471911f8b659c5b17330e813878333c4106f
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb