Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe
Resource
win7-20220901-en
General
-
Target
e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe
-
Size
1.2MB
-
MD5
0e86fb2120544989ae54edc86983bfed
-
SHA1
d2e5f4353494e2d99a9287e2f5d0e66d22955a92
-
SHA256
e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0
-
SHA512
8820b787e70af246255e68b9f8c8549a38d4fe6bf4e8586bdafbdc1fd970f94a1c6de3250babf97f2e3a6e206505538f1f3fbd27a21770b1e9f583afb92ff763
-
SSDEEP
24576:U4lavt0LkLL9IMixoEgea7xd6f/QDBFEjzFgzvDywupi25:jkwkn9IMHea7xmO78zuzA1
Malware Config
Extracted
cybergate
v1.02.1
Lammer
ipsx.no-ip.org:81
ipsx.no-ip.org:7000
ipsx.no-ip.org:2000
Pluguin
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Microsoft
-
install_file
Pluguin.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
VOCÊ FOI HACKEADO ...SEU SISTEMA SERÁ FORMATADO.
-
message_box_title
LAMMER
-
password
qwerty
-
regkey_hkcu
Avirnt
-
regkey_hklm
Avgnt
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\Microsoft\\Pluguin.exe" e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\Microsoft\\Pluguin.exe" e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe -
Executes dropped EXE 2 IoCs
pid Process 1612 Pluguin.exe 1708 Pluguin.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{10XMQ502-48SQ-62BJ-1PEO-DP7460R664P6}\StubPath = "C:\\Windows\\system32\\Microsoft\\Pluguin.exe Restart" e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{10XMQ502-48SQ-62BJ-1PEO-DP7460R664P6} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{10XMQ502-48SQ-62BJ-1PEO-DP7460R664P6}\StubPath = "C:\\Windows\\system32\\Microsoft\\Pluguin.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{10XMQ502-48SQ-62BJ-1PEO-DP7460R664P6} e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe -
resource yara_rule behavioral1/memory/976-71-0x0000000024010000-0x0000000024070000-memory.dmp upx behavioral1/memory/976-80-0x0000000024070000-0x00000000240D0000-memory.dmp upx behavioral1/memory/860-85-0x0000000024070000-0x00000000240D0000-memory.dmp upx behavioral1/memory/860-88-0x0000000024070000-0x00000000240D0000-memory.dmp upx behavioral1/memory/976-90-0x00000000240D0000-0x0000000024130000-memory.dmp upx behavioral1/memory/976-96-0x0000000024130000-0x0000000024190000-memory.dmp upx behavioral1/memory/1908-101-0x0000000024130000-0x0000000024190000-memory.dmp upx behavioral1/memory/1908-103-0x0000000024130000-0x0000000024190000-memory.dmp upx behavioral1/memory/1908-108-0x0000000024130000-0x0000000024190000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 1908 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Avgnt = "C:\\Windows\\system32\\Microsoft\\Pluguin.exe" e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Avirnt = "C:\\Windows\\system32\\Microsoft\\Pluguin.exe" e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000a000000012324-87.dat autoit_exe behavioral1/files/0x000a000000012324-104.dat autoit_exe behavioral1/files/0x000a000000012324-106.dat autoit_exe behavioral1/files/0x000a000000012324-120.dat autoit_exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Microsoft\Pluguin.exe e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe File opened for modification C:\Windows\SysWOW64\Microsoft\Pluguin.exe e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe File opened for modification C:\Windows\SysWOW64\Microsoft\ e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe File created C:\Windows\SysWOW64\Microsoft\Pluguin.exe e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1368 set thread context of 976 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 27 PID 1612 set thread context of 1708 1612 Pluguin.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1908 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1908 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe Token: SeDebugPrivilege 1908 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe -
Suspicious use of SendNotifyMessage 35 IoCs
pid Process 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe 1612 Pluguin.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1368 wrote to memory of 976 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 27 PID 1368 wrote to memory of 976 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 27 PID 1368 wrote to memory of 976 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 27 PID 1368 wrote to memory of 976 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 27 PID 1368 wrote to memory of 976 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 27 PID 1368 wrote to memory of 976 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 27 PID 1368 wrote to memory of 976 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 27 PID 1368 wrote to memory of 976 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 27 PID 1368 wrote to memory of 976 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 27 PID 1368 wrote to memory of 976 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 27 PID 1368 wrote to memory of 976 1368 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 27 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13 PID 976 wrote to memory of 1280 976 e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe 13
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe"C:\Users\Admin\AppData\Local\Temp\e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe"C:\Users\Admin\AppData\Local\Temp\e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe"3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Modifies Installed Components in the registry
PID:860
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1592
-
-
C:\Users\Admin\AppData\Local\Temp\e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe"C:\Users\Admin\AppData\Local\Temp\e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0.exe"4⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1908 -
C:\Windows\SysWOW64\Microsoft\Pluguin.exe"C:\Windows\system32\Microsoft\Pluguin.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1612 -
C:\Windows\SysWOW64\Microsoft\Pluguin.exe"C:\Windows\SysWOW64\Microsoft\Pluguin.exe"6⤵
- Executes dropped EXE
PID:1708
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
221KB
MD5801429de05504a323d188acda5244adf
SHA16a6b8f639d244c590741bf804366484f842df2b2
SHA256dc2aed07a7b10bc0ff5d5f727c710335481d170ead9c9d8f0928de457e7ca645
SHA512c10599c58bab7800f5c06ac803beb9169dadd7d801e85791c3956e88bfe59d031c86108d1876c894e7188312e6bed48d3be19ddaa8ad61e2982d4c12d6553d85
-
Filesize
1.2MB
MD50e86fb2120544989ae54edc86983bfed
SHA1d2e5f4353494e2d99a9287e2f5d0e66d22955a92
SHA256e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0
SHA5128820b787e70af246255e68b9f8c8549a38d4fe6bf4e8586bdafbdc1fd970f94a1c6de3250babf97f2e3a6e206505538f1f3fbd27a21770b1e9f583afb92ff763
-
Filesize
1.2MB
MD50e86fb2120544989ae54edc86983bfed
SHA1d2e5f4353494e2d99a9287e2f5d0e66d22955a92
SHA256e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0
SHA5128820b787e70af246255e68b9f8c8549a38d4fe6bf4e8586bdafbdc1fd970f94a1c6de3250babf97f2e3a6e206505538f1f3fbd27a21770b1e9f583afb92ff763
-
Filesize
1.2MB
MD50e86fb2120544989ae54edc86983bfed
SHA1d2e5f4353494e2d99a9287e2f5d0e66d22955a92
SHA256e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0
SHA5128820b787e70af246255e68b9f8c8549a38d4fe6bf4e8586bdafbdc1fd970f94a1c6de3250babf97f2e3a6e206505538f1f3fbd27a21770b1e9f583afb92ff763
-
Filesize
1.2MB
MD50e86fb2120544989ae54edc86983bfed
SHA1d2e5f4353494e2d99a9287e2f5d0e66d22955a92
SHA256e22f93f07544b0f475c263e30eb420c1aa3823264df3a6715aa6e33cfdf5dbb0
SHA5128820b787e70af246255e68b9f8c8549a38d4fe6bf4e8586bdafbdc1fd970f94a1c6de3250babf97f2e3a6e206505538f1f3fbd27a21770b1e9f583afb92ff763