Analysis
-
max time kernel
151s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 03:31
Static task
static1
Behavioral task
behavioral1
Sample
31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe
Resource
win10v2004-20220812-en
General
-
Target
31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe
-
Size
956KB
-
MD5
a298aada73c1c71073bb75c10fc868aa
-
SHA1
7cb28911404b40b7dd8f70f3614047d91c8bc2e3
-
SHA256
31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072
-
SHA512
821518b0693b6bc1d345822c834486915f9ffdbc8a89045e44fc98022fc924e8c7ad59148acc1523ebb08a2060b559b0e75ee2391738375775fc0f921b005b7e
-
SSDEEP
12288:rj9l69ZU++3jUOIcr1MFNXJKsg1ViMPm4QdVG41Urem/2pSYtaL9:rDsOIcrMXosg1VLp8Vm/2cB
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe smrss.exe" 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe -
Executes dropped EXE 1 IoCs
pid Process 1148 30403.exe -
Loads dropped DLL 4 IoCs
pid Process 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1148 30403.exe 1148 30403.exe 1148 30403.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\WINDOWS\\system32\\svchost.exe" reg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\freizer = "C:\\WINDOWS\\system32\\freizer.exe" reg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\smrss.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Windows\SysWOW64\smrss.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File created C:\WINDOWS\SysWOW64\freizer.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\notification_helper.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\LICLUA.EXE 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-hang-ui.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\vsta_ep32.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateSetup.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateOnDemand.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\SmartTagInstall.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\89.0.4389.114\chrome_installer.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_pwa_launcher.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\Wkconv.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Windows Media Player\WMPSideShowGadget.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdate.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Windows Media Player\wmpnscfg.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Setup.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateCore.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\svchost.exe 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2000 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 26 PID 1992 wrote to memory of 2000 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 26 PID 1992 wrote to memory of 2000 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 26 PID 1992 wrote to memory of 2000 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 26 PID 1992 wrote to memory of 896 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 27 PID 1992 wrote to memory of 896 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 27 PID 1992 wrote to memory of 896 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 27 PID 1992 wrote to memory of 896 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 27 PID 896 wrote to memory of 844 896 cmd.exe 31 PID 896 wrote to memory of 844 896 cmd.exe 31 PID 896 wrote to memory of 844 896 cmd.exe 31 PID 896 wrote to memory of 844 896 cmd.exe 31 PID 2000 wrote to memory of 1324 2000 cmd.exe 32 PID 2000 wrote to memory of 1324 2000 cmd.exe 32 PID 2000 wrote to memory of 1324 2000 cmd.exe 32 PID 2000 wrote to memory of 1324 2000 cmd.exe 32 PID 1992 wrote to memory of 1148 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 30 PID 1992 wrote to memory of 1148 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 30 PID 1992 wrote to memory of 1148 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 30 PID 1992 wrote to memory of 1148 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 30 PID 1992 wrote to memory of 1148 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 30 PID 1992 wrote to memory of 1148 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 30 PID 1992 wrote to memory of 1148 1992 31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe"C:\Users\Admin\AppData\Local\Temp\31d3f19ccc4fb8a20f3faca6b6b4b77a2edd5b924a13daf60866f8925b288072.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f3⤵
- Adds Run key to start application
PID:1324
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f3⤵
- Adds Run key to start application
PID:844
-
-
-
C:\windows\temp\30403.exe"C:\windows\temp\30403.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1148
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5eb934876df98326f113edbc7c8bffef3
SHA1f5cba9aec319c16276e7a79bd8827d1f132bf02f
SHA2563bf1758a111fe6253b21d0f090a92e1c35c8f6a3277b843a38a5fcd486baafc3
SHA512eb03c7fb8fac405d7d94adcf22da168386efb5eaedbcf5cdb54ef0390c0bac53894cc7d3d7543c91ef28a4192729391d72614f435a11be5619be1594eb959178
-
Filesize
15KB
MD5eb934876df98326f113edbc7c8bffef3
SHA1f5cba9aec319c16276e7a79bd8827d1f132bf02f
SHA2563bf1758a111fe6253b21d0f090a92e1c35c8f6a3277b843a38a5fcd486baafc3
SHA512eb03c7fb8fac405d7d94adcf22da168386efb5eaedbcf5cdb54ef0390c0bac53894cc7d3d7543c91ef28a4192729391d72614f435a11be5619be1594eb959178
-
Filesize
15KB
MD5eb934876df98326f113edbc7c8bffef3
SHA1f5cba9aec319c16276e7a79bd8827d1f132bf02f
SHA2563bf1758a111fe6253b21d0f090a92e1c35c8f6a3277b843a38a5fcd486baafc3
SHA512eb03c7fb8fac405d7d94adcf22da168386efb5eaedbcf5cdb54ef0390c0bac53894cc7d3d7543c91ef28a4192729391d72614f435a11be5619be1594eb959178
-
Filesize
15KB
MD5eb934876df98326f113edbc7c8bffef3
SHA1f5cba9aec319c16276e7a79bd8827d1f132bf02f
SHA2563bf1758a111fe6253b21d0f090a92e1c35c8f6a3277b843a38a5fcd486baafc3
SHA512eb03c7fb8fac405d7d94adcf22da168386efb5eaedbcf5cdb54ef0390c0bac53894cc7d3d7543c91ef28a4192729391d72614f435a11be5619be1594eb959178
-
Filesize
15KB
MD5eb934876df98326f113edbc7c8bffef3
SHA1f5cba9aec319c16276e7a79bd8827d1f132bf02f
SHA2563bf1758a111fe6253b21d0f090a92e1c35c8f6a3277b843a38a5fcd486baafc3
SHA512eb03c7fb8fac405d7d94adcf22da168386efb5eaedbcf5cdb54ef0390c0bac53894cc7d3d7543c91ef28a4192729391d72614f435a11be5619be1594eb959178
-
Filesize
15KB
MD5eb934876df98326f113edbc7c8bffef3
SHA1f5cba9aec319c16276e7a79bd8827d1f132bf02f
SHA2563bf1758a111fe6253b21d0f090a92e1c35c8f6a3277b843a38a5fcd486baafc3
SHA512eb03c7fb8fac405d7d94adcf22da168386efb5eaedbcf5cdb54ef0390c0bac53894cc7d3d7543c91ef28a4192729391d72614f435a11be5619be1594eb959178