Analysis
-
max time kernel
152s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe
Resource
win7-20220812-en
General
-
Target
c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe
-
Size
953KB
-
MD5
a21ca40d709fe9093156e92618122130
-
SHA1
d6da971eb88404954d8f791951a4858ad68d525c
-
SHA256
c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593
-
SHA512
92455276d861e91d3309bcda5a5d701d8599306a05f458642cfd9e41108f82a5ec9b3a559f15299a21c6083ac9a77b5146d4b3025990a2a12fb57d6b7a63093d
-
SSDEEP
12288:NQnN/7YkrWBfWhvRhQUQYD7K4vX1ToviVg4UBLMHFVhHdJKXbmjlIPE/0v6Gfalk:NQnN/7DSBfWhQmnXQ85eLStwaIQMrW6
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 5 IoCs
pid Process 4944 elevation_service.exe 620 elevation_service.exe 4088 maintenanceservice.exe 1672 OSE.EXE 2144 ssh-agent.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-2629973501-4017243118-3254762364-1000 elevation_service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-2629973501-4017243118-3254762364-1000\EnableNotifications = "0" elevation_service.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\mdgkfajodaliacghnafobjnclblcfmlm\1.0_0\manifest.json c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe -
Enumerates connected drives 3 TTPs 44 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened (read-only) \??\P: c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened (read-only) \??\Z: c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened (read-only) \??\I: elevation_service.exe File opened (read-only) \??\T: elevation_service.exe File opened (read-only) \??\U: elevation_service.exe File opened (read-only) \??\Z: elevation_service.exe File opened (read-only) \??\F: c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened (read-only) \??\J: c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened (read-only) \??\N: c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened (read-only) \??\T: c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened (read-only) \??\H: elevation_service.exe File opened (read-only) \??\S: elevation_service.exe File opened (read-only) \??\Q: c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened (read-only) \??\E: elevation_service.exe File opened (read-only) \??\I: c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened (read-only) \??\S: c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened (read-only) \??\J: elevation_service.exe File opened (read-only) \??\N: elevation_service.exe File opened (read-only) \??\X: elevation_service.exe File opened (read-only) \??\G: c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened (read-only) \??\L: c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened (read-only) \??\Y: c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened (read-only) \??\P: elevation_service.exe File opened (read-only) \??\E: c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened (read-only) \??\K: c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened (read-only) \??\X: c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened (read-only) \??\G: elevation_service.exe File opened (read-only) \??\K: elevation_service.exe File opened (read-only) \??\R: elevation_service.exe File opened (read-only) \??\Y: elevation_service.exe File opened (read-only) \??\U: c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened (read-only) \??\V: c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened (read-only) \??\W: c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened (read-only) \??\L: elevation_service.exe File opened (read-only) \??\W: elevation_service.exe File opened (read-only) \??\M: c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened (read-only) \??\O: c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened (read-only) \??\R: c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened (read-only) \??\F: elevation_service.exe File opened (read-only) \??\M: elevation_service.exe File opened (read-only) \??\O: elevation_service.exe File opened (read-only) \??\Q: elevation_service.exe File opened (read-only) \??\V: elevation_service.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created \??\c:\windows\system32\ljkpfnaf.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created \??\c:\windows\system32\WindowsPowerShell\v1.0\kdmcdjdf.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\dllhost.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\SysWOW64\perceptionsimulation\perceptionsimulationservice.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\SysWOW64\sensordataservice.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\Appvclient.exe elevation_service.exe File created \??\c:\windows\system32\ndpmleni.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe elevation_service.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\SysWOW64\Appvclient.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created \??\c:\windows\system32\jneaiofl.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created \??\c:\windows\system32\lqjljldn.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\SysWOW64\dllhost.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\alg.exe elevation_service.exe File opened for modification \??\c:\windows\system32\spectrum.exe elevation_service.exe File opened for modification \??\c:\windows\system32\vds.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\SysWOW64\tieringengineservice.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\WindowsPowerShell\v1.0\powershell.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe elevation_service.exe File created \??\c:\windows\system32\lfppcoik.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\dllhost.exe elevation_service.exe File opened for modification \??\c:\windows\system32\locator.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\fxssvc.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created \??\c:\windows\system32\mdedbmlc.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\msiexec.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\spectrum.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\SysWOW64\openssh\ssh-agent.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\Agentservice.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\SysWOW64\wbengine.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\wbengine.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created \??\c:\windows\system32\kblehpdi.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\SysWOW64\msiexec.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\fxssvc.exe elevation_service.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\diagsvcs\diagnosticshub.standardcollector.service.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\SysWOW64\perfhost.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\msdtc.exe elevation_service.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe elevation_service.exe File opened for modification \??\c:\windows\system32\snmptrap.exe elevation_service.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\hkpphkmc.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\svchost.exe elevation_service.exe File opened for modification \??\c:\windows\system32\Agentservice.exe elevation_service.exe File opened for modification \??\c:\windows\system32\alg.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\lsass.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created \??\c:\windows\SysWOW64\impnkhif.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\searchindexer.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\svchost.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\Appvclient.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\snmptrap.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created \??\c:\windows\system32\openssh\nfkbjbgd.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\system32\lsass.exe elevation_service.exe File opened for modification \??\c:\windows\system32\msiexec.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe elevation_service.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\klonohhl.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\7-Zip\7zG.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe elevation_service.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\knqknjlo.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\gmoggjie.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\dklkkafp.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\7-Zip\7z.exe elevation_service.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe elevation_service.exe File created C:\Program Files\Internet Explorer\onnmbqjl.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\dbdfboki.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\ighnagcm.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_pwa_launcher.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\notification_helper.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created C:\Program Files\Internet Explorer\bhlnifll.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\7-Zip\7zG.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created C:\Program Files\7-Zip\amhadgcp.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created \??\c:\program files\common files\microsoft shared\source engine\lmqgjgcf.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created C:\Program Files\Common Files\microsoft shared\ink\akaajeom.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\gakpqfhp.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created C:\Program Files\Google\Chrome\Application\cpkcoelj.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\program files\google\chrome\Application\89.0.4389.114\elevation_service.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created \??\c:\program files\google\chrome\Application\89.0.4389.114\hnnngcah.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\gfjngfoj.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\nimidobm.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\odadaonc.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created \??\c:\program files\windows media player\ejlooqnl.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created \??\c:\program files (x86)\mozilla maintenance service\dnnhmfma.tmp c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe elevation_service.exe File opened for modification C:\Program Files\7-Zip\7z.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe elevation_service.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe 4944 elevation_service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 636 Process not Found 636 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3444 c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe Token: SeTakeOwnershipPrivilege 4944 elevation_service.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer elevation_service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" elevation_service.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe"C:\Users\Admin\AppData\Local\Temp\c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe"1⤵
- Drops Chrome extension
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3444
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4944
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:620
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4088
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:1672
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:2144
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5224b176dbf15ba11c36a55f53e3811e9
SHA153837904fd0792d423b1248a2caff869c37bcb8d
SHA256cfc6046cf04bcfa64c10cb815aad40fd696af66224cbd9069c0e07c837105562
SHA512d27d8ba4e9e931af8b095c7c278ef51b30cc9a16ec3054333bf0f95428fa33e19e07bfb16f2aa0cbe93356b59b94f59acccb492b83111ce18d23dadb87ba95a9
-
Filesize
804KB
MD5bf7969a395d3a68c29b0e6717e403b99
SHA12cc2d5bf462dd4b98333938bd140fa16a5e4cb20
SHA2568a119e1d2c631347e5f74046bdf66654da5a9bf60d86d094a226d971fc59b276
SHA51252c2ac254427a006432e99325cc7975020f3253e4b783d5f7c2caa8a78afe6af39b088011a9e13526d6eda61dbe0bdafe6853632ad854a876e218e36f10ebdf5
-
Filesize
1.0MB
MD592879b29f475f89eb15970cee03648da
SHA1afde8b707e93fa55dcddd876717930f329c3a959
SHA256bac1761713df1592fa0e65321000c8d02e87759a1518556f3403a55e13c1a770
SHA512aa4d172bd543412260123881e91cb19da8190d21d4f6251ace6bf630fa68e484b4d87679f9c28f918a816f7fcdeddce7158ef3d395e3a32ff5c954ba68a3163c
-
Filesize
1.4MB
MD5183df7a5cef41c8f4e77a3caf0484c09
SHA10ccf4b1b38925012595f2502ab441ac55b351b6d
SHA256e63585eb5e368830a207d106587b59155030a773598f798eeffde2653ada8ccb
SHA512edc01e0315313f0883add14b6e046db243aa8e3ea5ce69c58c69b71154aa101cf36e4cf1f68c12b931e82e571c165075cec5db4b1c6068c29cb51c6acd3a5b08
-
Filesize
1.1MB
MD5813d1f2c57b1cc0667afcd329d87a0c0
SHA14c7f779027fa1e4e43a9e68a6dda34d788f24f26
SHA256c0c429b741f8177682ebeb3f38b3393f906043e38380b63d088b4bb5f37a4cc8
SHA512c5482280e3febaf97ef5e0665a17d0dccf4e699291c99838b6b2577feef0c6004381c85dd79ed0665e09d62ee3a524695babf999c9ce93d712e6d49fbf2b5258
-
Filesize
587KB
MD5a89938fabbb9062656ff8275bda11fc5
SHA17e6f6dd04f45647f7319a730c01f8970ed372552
SHA256ea5fdddb0630b58d60661f697c3b8674f2ccd974bc62e3520e2dcca070c5c297
SHA512785e743891db9e77c0ff887f899f6603f004f15f1151f12273074e4e8ff0aaddbe5b02522a5a91db92a8efa50aec19d06b43a21efb765c2d0c5b7c3464bd9ddd
-
Filesize
848KB
MD53c1e33ad54db871f244ac6179a567950
SHA17805732343a6bc550676d521c1b06968e8d6baba
SHA2566dfa79901044881a1658fff7f2edbbc1bbeb5aeaa4f7d7ba80c27cd9920786ef
SHA5120f0dff494f3a3caa4916d174ee798cbb379b4d523f0d43a7fe6815b703a42b41b34adc760f7bae875b62174f49b437bf30133dee529f18eb5fbf56a00792e1ea
-
Filesize
4.6MB
MD5011c41309b518ed44c6557fb91c12397
SHA1da276d3f2fb7e312f223edb49ec5eea12053e18f
SHA256538c05a7535f31fa7ecfeaf787c402b66546d2d23762eee0b4e3a169a812166d
SHA51274b17bd4df1146b79f890c8d75f7ae33fca621148d4e94d548fcf0c5c04a1b91d9af74664064e4eef473f2149b897b2a03ce0add678c59c82bba3547f1574a57
-
Filesize
918KB
MD5b6dbbd4d5a3bb6975b8793585fdc7f45
SHA1fc1807d669cbd60cf39c937e72f211afd884da90
SHA25649ee21d3d6d418b674391c49ba0ef0e09dedaf709cd9cf56e4423d5c14515e7f
SHA51260ebe61457adf0421603d40902ff0ea58a7a334945bf0ed287ca1eba70081a3db5000b59e6d27b66e9978b060bbf1b1637ecb6bdbdb3e367c34f6603cebb7bd0
-
Filesize
24.0MB
MD5bd2da2f2d0c0bbcc113bbfc420e2b40c
SHA1342323a75210ea792aa3e37603154e1b40bda7f6
SHA25697244fa6e133c53d79eca5af3beec8e1d42b6520c2de95a264428fbcbeb2976a
SHA512d1ffa0523f5269a2e48bb237cbeebeab8e36438bd4526d6de89e23766991efa2071baaa35a94973f66136dadf8c83135caec457b5b40f9ba356c2989b8466b83
-
Filesize
2.7MB
MD57f50e0f009542a38b8133f7577813846
SHA154ec6b5872a13678cdbf3bef86f12337c7b72747
SHA256a4ded55ef3fdbdc58b7f08977d8cd1ca26984f9cd1298ddc70dfc94732610e52
SHA5127e335f227f282ce3671d720827548e234a1984a15e4d74f6007cad3eae9f45ab47e97e41dca299dc93e3b97d7f5561bcb3f11b0517baa78057a6782ee15b87ac
-
Filesize
813KB
MD54396d18453bc77ddca85a394173a6818
SHA13878e62e30676ffd6b9e44ebd50d96bf62c53b97
SHA25637fef24eb000094702fc97c7a2589dc351646b59b9aa3cc4a857361727cf58e5
SHA512e02b36fe6b4cbfe93e899a71e4ac82407914814647929e74b76e37955b0d2e612175be9e22acaf1b77272480ac0542f823776ab7d99431b5afff8bc01ccc966f
-
Filesize
2.0MB
MD5f4c20d5d036e50a853ad949f3e678b66
SHA19ab8d60c17c242ac0fbe5e74ebc5c76df0b2de35
SHA25621792db87fa05261f1e874db0bcb100bdb4165cfd173cfc694c1e318b7db2337
SHA512d2cdda50c9f85a7433f00e32c62711f86410dc4ee5ad1427e0843f88a52c151fd8c99d659f9a57b13321034365fc44522e29808208f48bfb21aec37760141c48
-
Filesize
948KB
MD52e50ac1e696020646025d9e6840ab64f
SHA1cfa3f825f3d6c762dd60cb62b6a53236dfccb789
SHA2567dad320a36df48774a20be9edeff93d77f8a5867c72bdb05ccb61314112b9d10
SHA5126a83e60b3c5e64a97f79c29bb58728045b415af3219d72abe6538d639ca08ec8037872a06a9f360ca4a30b1e18ce496ee8b645ac4235fcd4b8a2659e307eeb22
-
Filesize
948KB
MD52e50ac1e696020646025d9e6840ab64f
SHA1cfa3f825f3d6c762dd60cb62b6a53236dfccb789
SHA2567dad320a36df48774a20be9edeff93d77f8a5867c72bdb05ccb61314112b9d10
SHA5126a83e60b3c5e64a97f79c29bb58728045b415af3219d72abe6538d639ca08ec8037872a06a9f360ca4a30b1e18ce496ee8b645ac4235fcd4b8a2659e307eeb22
-
Filesize
5.6MB
MD527366a73a123b190a38f4cb51ae4a3c3
SHA188b6fb9e23be33b80b33a052fca0b762450a5c5d
SHA256c142ca02a1a8fff67056951ed9c870f0721a441eff66f1f51c9b15542833b1cf
SHA512caf9998e680eef2ad6e61fd803c71175e037238504692647972029f15de86b536c1d29f079795b14e2d53e8c312fb13130f6282fc996d6c97b0881df2e6799a0
-
Filesize
804KB
MD5bf7969a395d3a68c29b0e6717e403b99
SHA12cc2d5bf462dd4b98333938bd140fa16a5e4cb20
SHA2568a119e1d2c631347e5f74046bdf66654da5a9bf60d86d094a226d971fc59b276
SHA51252c2ac254427a006432e99325cc7975020f3253e4b783d5f7c2caa8a78afe6af39b088011a9e13526d6eda61dbe0bdafe6853632ad854a876e218e36f10ebdf5
-
Filesize
1.5MB
MD5f345ee01b8f79bae416f7c33796a5d42
SHA1a5b32d2e320d8a88ba8ece64752ebe3fab694a15
SHA256013391e9fba9ae9ab1c2d6152c40bb56b34563116e3346720500874c8853a6d2
SHA512d3f96e498d6ca8aefada2ce0b70c7149fba296c65e51a8cb6b4b4f867036396c413cfaf2b34aed30a0c72771b523461c9e4e71aee2600e7594a9185a67d44000
-
Filesize
1.7MB
MD5ba99e96057da80217bda9afdf8929f3d
SHA1748743baf53aa48455bee7df0445b166da26a96c
SHA2561324c1f5b2636d5ceccb65f098bd29f81642cacbf462dd474370fcf8e913d546
SHA5126beac06fca87a36fadb97b710a6fa95180803ae7af14454810cd7b76ec406f14758fd2a3e8e538389300af9e874dfcc9390980b9afee2c4cb71ab51bca3da472
-
Filesize
1.3MB
MD552911badaa913bbee5a2e204ade8d5c0
SHA171e77609b58d93e07539f88ac870baffaaf83bd2
SHA256a00609ea27df589f546c9e5a0ad6a48cece52f85bed45e6d5a03a6d601d7e972
SHA51274f52c65f028fc044174d0f7e0e461c8f44f58baab2412ddf5e30f682b8fc7449350ee2c6755b6dc79ba9ca27799b5eef0ad67184de0a26d103503b6c44ab1bc
-
Filesize
1.2MB
MD54f086c256c2938e304b6b8f1612c690c
SHA1270ea7cee6e76c1fcad081d56b25304cfe2a68f2
SHA2568f5c28504703554ab8c55c6e1cc3b6f7d8ca4e53e7965e3b14c8c718658796ee
SHA51284bc49beb1dbe1a98dc941fee9ceaf7cd9843d44915f1116a628ee442eda0290108332cb263960f95d25bac4ed5f548a6e7d940f630335742b2d5d3ffe0835b7
-
Filesize
720KB
MD51e942d9355c1af414883bae097c6b56b
SHA12022728385e0dd83d4619f257c230f5643140218
SHA2569de72447bd2a25668cd619cc7dbdf31fdc16e9199029e4c5023d63ce54dd9172
SHA512fae951a92bd6497a976fdac4fa6d77c85b35c0da8789ba3d16aed48a7ff2a15e04fba1ef180074865abbc1b89556518e89179a8be2cce2d3904aa16d86a9842c
-
Filesize
643KB
MD5be97605419891a004b6d0c065dac5486
SHA156f470f7b8efb8567ef943abee035a029520db4b
SHA256adcc2d22eba27d033dccb4e4e122f0e0a97b11baa5384869aa689bc780dbc7f6
SHA5125e17acc573936341e992574e657b5ff77d5c3ed029a7554ed5691db45ce14758540611dc831dc0feaabd7498c4934672a9937871e7f611a6568b711015db75d4
-
Filesize
592KB
MD560ac0ea6273f1b595af63630bbd67b68
SHA1b1f8482c83c85fe41819f7877620376e1788c521
SHA25617984c3a8f36bf3a52097a3de6a5df430f072738da787764803151854331484d
SHA512d6ca46b7a2454c5147341b4bd7b18a5a9c566ac55f48df7caac2d9d1f33d3ed5c20f1298567c7e9085a0db494d45fbcc8bc06034177392ba2394bf7b6aef6078
-
Filesize
2.1MB
MD50573be26c8c7470f7242f18c5e7f2452
SHA1bf607fa854a4ac1e695dcbaa7dad0d59d597e14b
SHA2569563eac53b9dcfb9f3283796d92115ac19a4e09d2a381f12f2671d2bb423498b
SHA5126e37f5d604cc94d7761eda1324043e231391d5b24e546e26fc9db5bb2ec644260a22c2a32830f3a36ab046741a5d496c3a616c08da9e862c704130bcefbded4b