Analysis
-
max time kernel
80s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 05:42
Static task
static1
Behavioral task
behavioral1
Sample
6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe
Resource
win7-20220812-en
General
-
Target
6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe
-
Size
669KB
-
MD5
8875252baf1b0d425a5860af5034faf3
-
SHA1
90126995a28e53de5111aeb8e6bae73991ae4e7d
-
SHA256
6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98
-
SHA512
cad607f99967a64d68ab10eb728bf07c0298712ba7a93087a110060095aa13d7ddf388f5cef60bae555a3917bbe326b06e4513a1ccef9174949d5db77412c617
-
SSDEEP
12288:hAl8lcnYaO2Xco5tMexqpoq6njaWoNE/oJ7tf5Vppm/IsuOcbJ:hA/nYa/PtMekanjaWoNn7tfZw/Dct
Malware Config
Extracted
nanocore
1.2.2.2
weloveyoumum.no-ip.biz:3360
193.0.200.146:3360
7203f178-ae30-4b42-9da7-2401bb9ff74f
-
activate_away_mode
true
-
backup_connection_host
193.0.200.146
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2015-05-11T16:40:24.425390936Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
3360
-
default_group
ASAP
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
7203f178-ae30-4b42-9da7-2401bb9ff74f
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
weloveyoumum.no-ip.biz
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.2
-
wan_timeout
8000
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\UXEdCq961HPsZ315\\vlMIPhBd31Qr.exe\",explorer.exe" 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\UXEdCq961HPsZ315\\cCsjDP2iVKLH.exe\" \"C:\\Users\\Admin\\AppData\\Roaming\\UXEdCq961HPsZ315\\vlMIPhBd31Qr.exe\",explorer.exe" 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DDP Manager = "C:\\Program Files (x86)\\DDP Manager\\ddpmgr.exe" 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4280 set thread context of 4968 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 90 PID 4280 set thread context of 2772 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 97 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\DDP Manager\ddpmgr.exe 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe File opened for modification C:\Program Files (x86)\DDP Manager\ddpmgr.exe 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 4028 792 WerFault.exe 13 2464 788 WerFault.exe 8 2276 1796 WerFault.exe 36 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 4968 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 4968 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 4968 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe Token: SeDebugPrivilege 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe Token: SeDebugPrivilege 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe Token: SeDebugPrivilege 4968 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe Token: SeDebugPrivilege 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe Token: SeRestorePrivilege 3232 dw20.exe Token: SeBackupPrivilege 3232 dw20.exe Token: SeBackupPrivilege 3232 dw20.exe Token: SeBackupPrivilege 3232 dw20.exe Token: SeBackupPrivilege 3232 dw20.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4280 wrote to memory of 4968 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 90 PID 4280 wrote to memory of 4968 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 90 PID 4280 wrote to memory of 4968 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 90 PID 4280 wrote to memory of 4968 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 90 PID 4280 wrote to memory of 4968 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 90 PID 4280 wrote to memory of 4968 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 90 PID 4280 wrote to memory of 4968 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 90 PID 4280 wrote to memory of 4968 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 90 PID 4280 wrote to memory of 780 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 9 PID 4280 wrote to memory of 788 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 8 PID 4280 wrote to memory of 792 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 13 PID 4280 wrote to memory of 904 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 12 PID 4280 wrote to memory of 952 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 11 PID 4280 wrote to memory of 424 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 14 PID 4280 wrote to memory of 624 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 79 PID 4280 wrote to memory of 648 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 15 PID 4280 wrote to memory of 1036 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 78 PID 4280 wrote to memory of 1044 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 77 PID 4280 wrote to memory of 1156 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 16 PID 4280 wrote to memory of 2772 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 97 PID 4280 wrote to memory of 2772 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 97 PID 4280 wrote to memory of 2772 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 97 PID 4280 wrote to memory of 2772 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 97 PID 4280 wrote to memory of 2772 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 97 PID 4280 wrote to memory of 2772 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 97 PID 4280 wrote to memory of 2772 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 97 PID 4280 wrote to memory of 2772 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 97 PID 4280 wrote to memory of 780 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 9 PID 4280 wrote to memory of 904 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 12 PID 4280 wrote to memory of 952 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 11 PID 4280 wrote to memory of 424 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 14 PID 4280 wrote to memory of 624 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 79 PID 4280 wrote to memory of 648 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 15 PID 4280 wrote to memory of 1036 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 78 PID 4280 wrote to memory of 1044 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 77 PID 4280 wrote to memory of 1156 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 16 PID 4280 wrote to memory of 1196 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 76 PID 4280 wrote to memory of 1228 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 75 PID 4280 wrote to memory of 1292 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 74 PID 4280 wrote to memory of 1300 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 73 PID 4280 wrote to memory of 1420 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 72 PID 4280 wrote to memory of 1436 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 71 PID 4280 wrote to memory of 1456 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 70 PID 4280 wrote to memory of 1528 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 69 PID 4280 wrote to memory of 1588 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 68 PID 4280 wrote to memory of 1624 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 17 PID 4280 wrote to memory of 1648 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 67 PID 4280 wrote to memory of 1664 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 66 PID 4280 wrote to memory of 1196 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 76 PID 4280 wrote to memory of 1228 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 75 PID 4280 wrote to memory of 1292 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 74 PID 4280 wrote to memory of 1300 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 73 PID 4280 wrote to memory of 1420 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 72 PID 4280 wrote to memory of 1436 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 71 PID 4280 wrote to memory of 1456 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 70 PID 4280 wrote to memory of 1528 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 69 PID 4280 wrote to memory of 1588 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 68 PID 4280 wrote to memory of 1624 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 17 PID 4280 wrote to memory of 1648 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 67 PID 4280 wrote to memory of 1664 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 66 PID 4280 wrote to memory of 1760 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 65 PID 4280 wrote to memory of 1840 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 64 PID 4280 wrote to memory of 1872 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 63 PID 4280 wrote to memory of 1880 4280 6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe 62
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:788
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 788 -s 1402⤵
- Program crash
PID:2464
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:780
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4192
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:3812
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4704
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:1796
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1796 -s 6763⤵
- Program crash
PID:2276
-
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3720
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:3528
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3444
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3372
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3284
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding2⤵PID:4556
-
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding2⤵PID:4916
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:904
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:792
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 792 -s 1402⤵
- Program crash
PID:4028
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:424
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:648
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
PID:1156 -
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2456
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1624
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:1476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s W32Time1⤵PID:4764
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4100
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:1920
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:4756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:4400
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4636
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:2360
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe"C:\Users\Admin\AppData\Local\Temp\6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe"2⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe"C:\Users\Admin\AppData\Local\Temp\6378b8a02e4c68f5b2b2f14f8209bd7e64da90fae7bd7b85f13f38ee149d2d98.exe"3⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵PID:2772
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7724⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2752
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2740
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2716
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
PID:2636
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2488
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2480
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2332
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2324
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2148
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2100
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:1520
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1968
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1880
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1872
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1840
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1760
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1664
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s FontCache1⤵PID:1648
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1588
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1528
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1456
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1436
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1420
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1300
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1292
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1228
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1196
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1044
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1036
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:624
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:3224
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:1936
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 2f8360407969d3f60efeee55e27de5d2 YhBsBUJtukaLnjvoIPUPOg.0.1.0.0.01⤵PID:3120
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:3084
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:2284
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:4936
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:1096
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:4444
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 412 -p 792 -ip 7922⤵PID:4448
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 424 -p 788 -ip 7882⤵PID:736
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 528 -p 3284 -ip 32842⤵PID:3584
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 544 -p 1796 -ip 17962⤵PID:3440
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 584 -p 3284 -ip 32842⤵PID:1260
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 612 -p 1796 -ip 17962⤵PID:4276
-