Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 12:45
Static task
static1
Behavioral task
behavioral1
Sample
2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe
Resource
win10v2004-20220901-en
General
-
Target
2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe
-
Size
1020KB
-
MD5
07bbb97c9c2bc48d886db6c28741c196
-
SHA1
65a925f4b3c2ef926b49c3524f6639ef861bff2f
-
SHA256
2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a
-
SHA512
78878e7d0d18952d85a5ce0e7cc1f4be6fe9a36d53e6b10408c4b5cde11ac67cc7fbea04113bd819aeb605a11fbf26f6b2405e9df31d217ddc2aff684c0d25cb
-
SSDEEP
12288:rjS3Yvyn/0TkLFU6HRettEbqrJ+hifHW8NUnVuG:ru3Y54xHAkbqo8NUnV5
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe smrss.exe" 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe -
Executes dropped EXE 1 IoCs
pid Process 1852 10130.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\freizer = "C:\\WINDOWS\\system32\\freizer.exe" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\WINDOWS\\system32\\svchost.exe" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\freizer.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File created C:\Windows\SysWOW64\smrss.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Windows\SysWOW64\smrss.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX45.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\7-Zip\7z.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_pwa_launcher.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javap.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\keytool.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\keytool.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\tnameserv.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javadoc.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jcmd.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\unpack200.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PPTICO.EXE 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javafxpackager.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPPREARM.EXE 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.Loader.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jdb.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\rmid.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVLP.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\officeappguardwin32.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\unpack200.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jjs.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ORGCHART.EXE 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\orbd.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\policytool.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\wsgen.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\kinit.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\kinit.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSQRY32.EXE 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jar.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jp2launcher.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\ssvagent.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\misc.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\nbexec64.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javacpl.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javaws.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoev.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\native2ascii.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ktab.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoadfsb.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jconsole.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jabswitch.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate64.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\serialver.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\servertool.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoasb.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOUC.EXE 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\svchost.exe 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1852 10130.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4280 wrote to memory of 360 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 85 PID 4280 wrote to memory of 360 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 85 PID 4280 wrote to memory of 360 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 85 PID 4280 wrote to memory of 4140 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 86 PID 4280 wrote to memory of 4140 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 86 PID 4280 wrote to memory of 4140 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 86 PID 4140 wrote to memory of 1552 4140 cmd.exe 90 PID 4140 wrote to memory of 1552 4140 cmd.exe 90 PID 4140 wrote to memory of 1552 4140 cmd.exe 90 PID 360 wrote to memory of 1528 360 cmd.exe 89 PID 360 wrote to memory of 1528 360 cmd.exe 89 PID 360 wrote to memory of 1528 360 cmd.exe 89 PID 4280 wrote to memory of 1852 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 91 PID 4280 wrote to memory of 1852 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 91 PID 4280 wrote to memory of 1852 4280 2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe"C:\Users\Admin\AppData\Local\Temp\2e5a57832334e903a4443d2ea4f5f465f41abec97a662410e769353b56b3fd9a.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f3⤵
- Adds Run key to start application
PID:1528
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f3⤵
- Adds Run key to start application
PID:1552
-
-
-
C:\windows\temp\10130.exe"C:\windows\temp\10130.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1852
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD54d3d7de2365df210da13a5b2a524817d
SHA185ce60c4604e92e9a87891dc3cf1530a9056f505
SHA256a4bd4c37b948c965242a2e053fc4fc05ffee26f54a56199f39d551eee118b19e
SHA512d9b2f7bfeb85983e1092773e5d06bf035bdaf3296ec930e86f6d4c2365a9f3c6ef06462c0e99f113a9f3b2f3e6b8a66bf0f2573374c3965fc335ff29d7ea498a
-
Filesize
24KB
MD54d3d7de2365df210da13a5b2a524817d
SHA185ce60c4604e92e9a87891dc3cf1530a9056f505
SHA256a4bd4c37b948c965242a2e053fc4fc05ffee26f54a56199f39d551eee118b19e
SHA512d9b2f7bfeb85983e1092773e5d06bf035bdaf3296ec930e86f6d4c2365a9f3c6ef06462c0e99f113a9f3b2f3e6b8a66bf0f2573374c3965fc335ff29d7ea498a