Analysis
-
max time kernel
176s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21/10/2022, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe
Resource
win10v2004-20220812-en
General
-
Target
19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe
-
Size
234KB
-
MD5
4457eb48a059f7b928368c3a3cee32e1
-
SHA1
4818775ac7b3ef86cb83398a93fd26aed4e446f7
-
SHA256
19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b
-
SHA512
90758af84cea4a0e43555eebb66786f7796a6282f7a7baa466bf1512adb478ccfd4c6f1c50b3c7bb70fc0e621ad70caf2e93323dd1fec13de0df7ccd76cf49e9
-
SSDEEP
1536:aIqueF0GQ4DlMIR8PjIwh0dszwh0dsbwh0dsl:YBDCXPjl+2l
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe smrss.exe" 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe -
Executes dropped EXE 1 IoCs
pid Process 1360 31224.exe -
Loads dropped DLL 2 IoCs
pid Process 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\freizer = "C:\\WINDOWS\\system32\\freizer.exe" reg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\WINDOWS\\system32\\svchost.exe" reg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\smrss.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Windows\SysWOW64\smrss.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File created C:\WINDOWS\SysWOW64\freizer.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLED.EXE 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Windows Media Player\wmlaunch.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\SmartTagInstall.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\7-Zip\7z.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\ODeploy.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Windows Media Player\wmpnetwk.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\notification_helper.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateComRegisterShell64.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Oarpmany.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateCore.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateSetup.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{89BA9AFB-5EEA-4B19-9C5E-CEDE048A6D36}\chrome_installer.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\svchost.exe 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1360 31224.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2008 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 28 PID 1748 wrote to memory of 2008 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 28 PID 1748 wrote to memory of 2008 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 28 PID 1748 wrote to memory of 2008 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 28 PID 1748 wrote to memory of 2040 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 31 PID 1748 wrote to memory of 2040 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 31 PID 1748 wrote to memory of 2040 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 31 PID 1748 wrote to memory of 2040 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 31 PID 2008 wrote to memory of 956 2008 cmd.exe 34 PID 2008 wrote to memory of 956 2008 cmd.exe 34 PID 2008 wrote to memory of 956 2008 cmd.exe 34 PID 2008 wrote to memory of 956 2008 cmd.exe 34 PID 1748 wrote to memory of 1360 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 32 PID 1748 wrote to memory of 1360 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 32 PID 1748 wrote to memory of 1360 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 32 PID 1748 wrote to memory of 1360 1748 19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe 32 PID 2040 wrote to memory of 868 2040 cmd.exe 33 PID 2040 wrote to memory of 868 2040 cmd.exe 33 PID 2040 wrote to memory of 868 2040 cmd.exe 33 PID 2040 wrote to memory of 868 2040 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe"C:\Users\Admin\AppData\Local\Temp\19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f3⤵
- Adds Run key to start application
PID:956
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f3⤵
- Adds Run key to start application
PID:868
-
-
-
C:\windows\temp\31224.exe"C:\windows\temp\31224.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1360
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD54d3d7de2365df210da13a5b2a524817d
SHA185ce60c4604e92e9a87891dc3cf1530a9056f505
SHA256a4bd4c37b948c965242a2e053fc4fc05ffee26f54a56199f39d551eee118b19e
SHA512d9b2f7bfeb85983e1092773e5d06bf035bdaf3296ec930e86f6d4c2365a9f3c6ef06462c0e99f113a9f3b2f3e6b8a66bf0f2573374c3965fc335ff29d7ea498a
-
Filesize
24KB
MD54d3d7de2365df210da13a5b2a524817d
SHA185ce60c4604e92e9a87891dc3cf1530a9056f505
SHA256a4bd4c37b948c965242a2e053fc4fc05ffee26f54a56199f39d551eee118b19e
SHA512d9b2f7bfeb85983e1092773e5d06bf035bdaf3296ec930e86f6d4c2365a9f3c6ef06462c0e99f113a9f3b2f3e6b8a66bf0f2573374c3965fc335ff29d7ea498a
-
Filesize
24KB
MD54d3d7de2365df210da13a5b2a524817d
SHA185ce60c4604e92e9a87891dc3cf1530a9056f505
SHA256a4bd4c37b948c965242a2e053fc4fc05ffee26f54a56199f39d551eee118b19e
SHA512d9b2f7bfeb85983e1092773e5d06bf035bdaf3296ec930e86f6d4c2365a9f3c6ef06462c0e99f113a9f3b2f3e6b8a66bf0f2573374c3965fc335ff29d7ea498a