Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12/10/2022, 15:23
Static task
static1
Behavioral task
behavioral1
Sample
e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe
Resource
win10v2004-20220812-en
General
-
Target
e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe
-
Size
634KB
-
MD5
76a21d13dc46b8d41e0cbb57f21d5ac0
-
SHA1
cd4b721be961b58cc2fa524fa28416192b103acd
-
SHA256
e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2
-
SHA512
4c7d92a4d06db8316f31f2b1990f67cc3ffaf97c2957432a525cb52144ce9e2668c0201a75b024b61ce2386409dec04a485892928931ef53bd21e383c6d99f05
-
SSDEEP
6144:STv4sIND/AB4jYWoyGN2Ik5AfPjFWFNAy/7+dOYG+/WSZU6bewhrsRKcSTCn6:8ABhABEXotkI0A8AyzKOclfs3STCn
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe scvhost.exe" e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\scvhost.exe" e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\g: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\h: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\i: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\m: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\p: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\q: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\b: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\s: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\t: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\z: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\r: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\o: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\f: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\j: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\n: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\w: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\x: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\y: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\a: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\l: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\u: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\v: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\k: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\scvhost.exe e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened for modification C:\Windows\SysWOW64\scvhost.exe e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File created C:\Windows\SysWOW64\blastclnnn.exe e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened for modification C:\Windows\SysWOW64\blastclnnn.exe e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened for modification C:\Windows\SysWOW64\autorun.ini e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File created C:\Windows\SysWOW64\setting.ini e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened for modification C:\Windows\SysWOW64\setting.ini e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\scvhost.exe e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File created C:\Windows\hinhem.scr e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File created C:\Windows\scvhost.exe e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe Token: SeIncBasePriorityPrivilege 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 900 wrote to memory of 996 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 27 PID 900 wrote to memory of 996 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 27 PID 900 wrote to memory of 996 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 27 PID 900 wrote to memory of 996 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 27 PID 996 wrote to memory of 1732 996 cmd.exe 29 PID 996 wrote to memory of 1732 996 cmd.exe 29 PID 996 wrote to memory of 1732 996 cmd.exe 29 PID 996 wrote to memory of 1732 996 cmd.exe 29 PID 900 wrote to memory of 1216 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 30 PID 900 wrote to memory of 1216 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 30 PID 900 wrote to memory of 1216 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 30 PID 900 wrote to memory of 1216 900 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 30 PID 1216 wrote to memory of 1876 1216 cmd.exe 32 PID 1216 wrote to memory of 1876 1216 cmd.exe 32 PID 1216 wrote to memory of 1876 1216 cmd.exe 32 PID 1216 wrote to memory of 1876 1216 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe"C:\Users\Admin\AppData\Local\Temp\e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:1732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\blastclnnn.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\blastclnnn.exe3⤵PID:1876
-
-