Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 03:23
Static task
static1
Behavioral task
behavioral1
Sample
ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe
Resource
win7-20220812-en
General
-
Target
ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe
-
Size
736KB
-
MD5
84a20e79c3b5c5de1a34e153dad359fe
-
SHA1
56aedb1d58fabe505891fb93c351bd35de4c8644
-
SHA256
ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b
-
SHA512
de7de2cd9bcf19dfac6072be03b69ebb9627d2aa61e9e63412a9333d0addd5363fd4b525575111429cc9a5b39ad9a3399d94708c8f74d48562d0b19d6452a865
-
SSDEEP
6144:ijTwjof6xvJQrQMoahlJeHrs4aIEVkONMDjNbAN2MpOXR0y0XU2xTA7Da0O85wID:f4iWQMDHeHrnQNpS0ykKyIEAcIZJ
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 3152 elevation_service.exe 4880 elevation_service.exe 4900 maintenanceservice.exe 1352 OSE.EXE 4360 ssh-agent.exe 4396 TrustedInstaller.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\dlddmedljhmbgdhapibnagaanenmajcm\1.0_0\manifest.json ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened (read-only) \??\U: ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened (read-only) \??\X: ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened (read-only) \??\F: ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened (read-only) \??\L: ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened (read-only) \??\K: ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened (read-only) \??\O: ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened (read-only) \??\Q: ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened (read-only) \??\E: ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened (read-only) \??\J: ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened (read-only) \??\R: ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened (read-only) \??\W: ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened (read-only) \??\Y: ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened (read-only) \??\H: ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened (read-only) \??\N: ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened (read-only) \??\M: ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened (read-only) \??\P: ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened (read-only) \??\S: ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened (read-only) \??\V: ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened (read-only) \??\Z: ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened (read-only) \??\G: ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened (read-only) \??\I: ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe -
Drops file in System32 directory 61 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\msiexec.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\perceptionsimulation\perceptionsimulationservice.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\Appvclient.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created \??\c:\windows\system32\Appvclient.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created \??\c:\windows\system32\WindowsPowerShell\v1.0\powershell.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\spectrum.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created \??\c:\windows\system32\openssh\ssh-agent.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\vssvc.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\locator.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\vds.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created \??\c:\windows\system32\fxssvc.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\vds.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\diagsvcs\diagnosticshub.standardcollector.service.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\lsass.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\dllhost.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\tieringengineservice.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\wbengine.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\searchindexer.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\dllhost.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\msdtc.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\sgrmbroker.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\Agentservice.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\msiexec.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\openssh\ssh-agent.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\wbengine.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created \??\c:\windows\system32\msiexec.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\spectrum.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\Appvclient.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\snmptrap.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created \??\c:\windows\system32\snmptrap.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\Agentservice.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\sensordataservice.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\alg.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created \??\c:\windows\system32\Agentservice.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created \??\c:\windows\system32\wbengine.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\fxssvc.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\perfhost.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\WindowsPowerShell\v1.0\powershell.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created \??\c:\windows\system32\msdtc.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created \??\c:\windows\SysWOW64\msiexec.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\SysWOW64\vssvc.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\system32\svchost.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe -
Drops file in Program Files directory 58 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File created C:\Program Files\7-Zip\7zG.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_pwa_launcher.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created C:\Program Files\7-Zip\Uninstall.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created \??\c:\program files\common files\microsoft shared\source engine\ose.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created C:\Program Files\Common Files\microsoft shared\ink\mip.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created \??\c:\program files\windows media player\wmpnetwk.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created C:\Program Files\7-Zip\7zFM.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\program files\google\chrome\Application\89.0.4389.114\elevation_service.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files\7-Zip\7zG.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created C:\Program Files\7-Zip\7z.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created C:\Program Files\Common Files\microsoft shared\ink\TabTip.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created C:\Program Files\Internet Explorer\iexplore.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created \??\c:\program files\google\chrome\Application\89.0.4389.114\elevation_service.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\msedge.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_pwa_launcher.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files\7-Zip\7z.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.vir ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe File created C:\Windows\Logs\CBS\CBS.log TrustedInstaller.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TrustedInstaller.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 2704 3152 WerFault.exe 83 4520 4880 WerFault.exe 84 2484 1352 WerFault.exe 86 4284 4360 WerFault.exe 87 -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 648 Process not Found 648 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1948 ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe"C:\Users\Admin\AppData\Local\Temp\ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe"1⤵
- Drops Chrome extension
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3152 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3152 -s 5722⤵
- Program crash
PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4880 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4880 -s 4922⤵
- Program crash
PID:4520
-
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4900
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:1352 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1352 -s 2842⤵
- Program crash
PID:2484
-
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:4360 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4360 -s 3522⤵
- Program crash
PID:4284
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 452 -p 3152 -ip 31521⤵PID:3304
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 488 -p 4880 -ip 48801⤵PID:4124
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 360 -p 1352 -ip 13521⤵PID:2228
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 468 -p 4360 -ip 43601⤵PID:4332
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5cecc1664eb999a6f7d2a6d60b03cce48
SHA1399eb3f8d4c94ca06f6caac9bcbd8785e7b41e10
SHA2568e4057a347f1c5ca0d962aec4f947232fa0872d89b247023c8e5ace8024aad67
SHA5125c2153235afece54ceb38de9dfe8fdc20df93915c407e9f608f069060c0ab483ede175dbdf4aacbb065afca49ae099370aa17b352da51edc405f8c7a8bfa82d7
-
Filesize
730KB
MD53ee8978ceb0db30e0f7ce8ce59be906c
SHA1636c253032fca9314f3c43c28fd382fdefb1d441
SHA256959cbd43c5525bea813f029d0456b391a1f2d22651f2f30f5712ab60604a23fc
SHA512f6d1f5f1e2aa1dcfc38376ab94bbd6ce04729da5286957e43f228cc730f8c74a74efd7106a6857cf385a86a80e18e75bc8a5c4eb8fe29aa9c80dfa4dd4444254
-
Filesize
740KB
MD538351be72c9085103ac3810b1b2013f9
SHA10da3e466b7ae0032c5b9aaecd4707489e5acfc92
SHA2562d1245c5fa338546ca4d871c346e4f13bea6b8e6860b1c8dcb7bd9a63a97fac7
SHA51282d4d4571836e06225fc620867f90ba6a7c9b20136ed946d85adcfd6013cea17cc156f5980d13807b2037102c8c65bb2f057a97b5bae6384e9cc12376a65d2c0
-
Filesize
1.9MB
MD58aca0cce020f8be3edd9e420b5031cb5
SHA1ad6f193d5fbff82148f3ea33bf69598b4711060b
SHA256abeacdd08f6ddc7e0cd39ea7c6cd85a8f20a7732b3704ca3071a9549e61c152a
SHA5124295c72c95f6190fb5b1048967db0c74c22cbd2e5267b38eef1ffeb0927dbd90c9ebf16218d361111a4e668e4d689cfcdb31f656c036efe9378e0167cdc9dd75
-
Filesize
874KB
MD52a11fe287abfe7e35d8ec745957695ab
SHA132ddbbe52f18e87e10a3e2ee8104462941b9b29e
SHA256089a7c676862187692183102f71fef3c847e64adae0be99b5b21260e2320b330
SHA51221ed42d7110798e5f42eac67b767641ecfba6d09d32e73611363b5ecedc11147b922cda24284220055cde796e3d25162631b8e7c397fb62a34d106beea6eeb17
-
Filesize
874KB
MD52a11fe287abfe7e35d8ec745957695ab
SHA132ddbbe52f18e87e10a3e2ee8104462941b9b29e
SHA256089a7c676862187692183102f71fef3c847e64adae0be99b5b21260e2320b330
SHA51221ed42d7110798e5f42eac67b767641ecfba6d09d32e73611363b5ecedc11147b922cda24284220055cde796e3d25162631b8e7c397fb62a34d106beea6eeb17
-
Filesize
193KB
MD5805418acd5280e97074bdadca4d95195
SHA1a69e4f03d775a7a0cc5ed2d5569cbfbb4d31d2d6
SHA25673684e31ad4afe3fdc525b51ccaacc14d402c92db9c42e3fcbfe1e65524b1c01
SHA512630a255950c0ae0983ae907d20326adea36ce262c7784428a0811b04726849c929bc9cea338a89e77447a6cec30b0889694158327c002566d3cf5be2bb88e4de