Analysis
-
max time kernel
153s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 14:57
Behavioral task
behavioral1
Sample
a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe
Resource
win10v2004-20220812-en
General
-
Target
a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe
-
Size
248KB
-
MD5
111bb403113bf27e48e84bc66fab0a41
-
SHA1
ab8510318775ea9a4ccf47a3d6fc85ff880bbc0e
-
SHA256
a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609
-
SHA512
389336aca1d7f23a349905a33b2090943f309a814bb83c324dc7cafed1fb4f12d0201818c22d85affb1368d3ef5cb8d803dd10ecae0373f9a9b14ef3aaae2a0d
-
SSDEEP
6144:1uMJWY+qaHEQCcYfSBYJbQCjRcqESEgm6Anhc1kG6EmRzxH:1+YcUc6SBLLTSEgBAnhc1kGsxH
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe NOTEPAD1.exe" a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe -
Disables Task Manager via registry modification
-
Modifies Installed Components in the registry 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
resource yara_rule behavioral1/memory/1612-55-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral1/memory/1612-62-0x0000000000400000-0x000000000049D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\NOTEPAD1.exe" a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\z: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened (read-only) \??\a: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened (read-only) \??\h: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened (read-only) \??\m: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened (read-only) \??\r: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened (read-only) \??\s: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened (read-only) \??\v: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened (read-only) \??\w: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened (read-only) \??\e: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened (read-only) \??\f: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened (read-only) \??\j: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened (read-only) \??\n: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened (read-only) \??\t: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened (read-only) \??\u: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened (read-only) \??\x: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened (read-only) \??\b: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened (read-only) \??\i: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened (read-only) \??\p: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened (read-only) \??\q: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened (read-only) \??\g: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened (read-only) \??\k: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened (read-only) \??\l: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened (read-only) \??\o: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened (read-only) \??\y: a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1612-62-0x0000000000400000-0x000000000049D000-memory.dmp autoit_exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\NOTEPAD1.exe a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened for modification C:\Windows\SysWOW64\NOTEPAD1.exe a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File created C:\Windows\SysWOW64\WORD.exe a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened for modification C:\Windows\SysWOW64\WORD.exe a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened for modification C:\Windows\SysWOW64\autorun.ini a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\NOTEPAD1.exe a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe File opened for modification C:\Windows\NOTEPAD1.exe a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 25 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1640 explorer.exe Token: SeShutdownPrivilege 1640 explorer.exe Token: SeShutdownPrivilege 1640 explorer.exe Token: SeShutdownPrivilege 1640 explorer.exe Token: SeShutdownPrivilege 1640 explorer.exe Token: SeShutdownPrivilege 1640 explorer.exe Token: SeShutdownPrivilege 1640 explorer.exe Token: SeShutdownPrivilege 1640 explorer.exe Token: SeShutdownPrivilege 1640 explorer.exe Token: SeShutdownPrivilege 1640 explorer.exe Token: 33 1664 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1664 AUDIODG.EXE Token: 33 1664 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1664 AUDIODG.EXE Token: SeShutdownPrivilege 1640 explorer.exe Token: SeShutdownPrivilege 1640 explorer.exe Token: SeShutdownPrivilege 1688 explorer.exe Token: SeShutdownPrivilege 1688 explorer.exe Token: SeShutdownPrivilege 1688 explorer.exe Token: SeShutdownPrivilege 1688 explorer.exe Token: SeShutdownPrivilege 1688 explorer.exe Token: SeShutdownPrivilege 1688 explorer.exe Token: SeShutdownPrivilege 1688 explorer.exe Token: SeShutdownPrivilege 1688 explorer.exe Token: SeShutdownPrivilege 1688 explorer.exe Token: SeShutdownPrivilege 1688 explorer.exe Token: SeShutdownPrivilege 1688 explorer.exe Token: SeShutdownPrivilege 1688 explorer.exe Token: SeShutdownPrivilege 1980 explorer.exe Token: SeShutdownPrivilege 1980 explorer.exe Token: SeShutdownPrivilege 1980 explorer.exe Token: SeShutdownPrivilege 1980 explorer.exe Token: SeShutdownPrivilege 1980 explorer.exe Token: SeShutdownPrivilege 1980 explorer.exe Token: SeShutdownPrivilege 1980 explorer.exe Token: SeShutdownPrivilege 1980 explorer.exe Token: SeShutdownPrivilege 1980 explorer.exe Token: SeShutdownPrivilege 1980 explorer.exe Token: SeShutdownPrivilege 1980 explorer.exe Token: SeShutdownPrivilege 1980 explorer.exe Token: SeShutdownPrivilege 1408 explorer.exe Token: SeShutdownPrivilege 1408 explorer.exe Token: SeShutdownPrivilege 1408 explorer.exe Token: SeShutdownPrivilege 1408 explorer.exe Token: SeShutdownPrivilege 1408 explorer.exe Token: SeShutdownPrivilege 1408 explorer.exe Token: SeShutdownPrivilege 1408 explorer.exe Token: SeShutdownPrivilege 1408 explorer.exe Token: SeShutdownPrivilege 1408 explorer.exe Token: SeShutdownPrivilege 1408 explorer.exe Token: SeShutdownPrivilege 1408 explorer.exe Token: SeShutdownPrivilege 1408 explorer.exe Token: SeShutdownPrivilege 1912 explorer.exe Token: SeShutdownPrivilege 1912 explorer.exe Token: SeShutdownPrivilege 1912 explorer.exe Token: SeShutdownPrivilege 1912 explorer.exe Token: SeShutdownPrivilege 1912 explorer.exe Token: SeShutdownPrivilege 1912 explorer.exe Token: SeShutdownPrivilege 1912 explorer.exe Token: SeShutdownPrivilege 1912 explorer.exe Token: SeShutdownPrivilege 1912 explorer.exe Token: SeShutdownPrivilege 1912 explorer.exe Token: SeShutdownPrivilege 1912 explorer.exe Token: SeShutdownPrivilege 1912 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1688 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1980 explorer.exe 1408 explorer.exe 1408 explorer.exe 1408 explorer.exe 1408 explorer.exe 1408 explorer.exe 1408 explorer.exe 1408 explorer.exe 1408 explorer.exe 1408 explorer.exe 1408 explorer.exe 1408 explorer.exe 1408 explorer.exe 1408 explorer.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1956 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 26 PID 1612 wrote to memory of 1956 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 26 PID 1612 wrote to memory of 1956 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 26 PID 1612 wrote to memory of 1956 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 26 PID 1956 wrote to memory of 1704 1956 cmd.exe 28 PID 1956 wrote to memory of 1704 1956 cmd.exe 28 PID 1956 wrote to memory of 1704 1956 cmd.exe 28 PID 1956 wrote to memory of 1704 1956 cmd.exe 28 PID 1612 wrote to memory of 1528 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 29 PID 1612 wrote to memory of 1528 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 29 PID 1612 wrote to memory of 1528 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 29 PID 1612 wrote to memory of 1528 1612 a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe 29 PID 1528 wrote to memory of 1376 1528 cmd.exe 31 PID 1528 wrote to memory of 1376 1528 cmd.exe 31 PID 1528 wrote to memory of 1376 1528 cmd.exe 31 PID 1528 wrote to memory of 1376 1528 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe"C:\Users\Admin\AppData\Local\Temp\a8d2339bbfd99ebcf48d5ca04beb4634e3711088031d16523e18bfa218f66609.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:1704
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\WORD.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\WORD.exe3⤵PID:1376
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1640
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5881⤵
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1688
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1980
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:1408
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1912