Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 18:21
Behavioral task
behavioral1
Sample
56f2583edfe15a01c1f83269d1b0f9ec58d60e7f1b568c9b834de19aa3e8d35b.exe
Resource
win7-20220812-en
General
-
Target
56f2583edfe15a01c1f83269d1b0f9ec58d60e7f1b568c9b834de19aa3e8d35b.exe
-
Size
591KB
-
MD5
81a95c0e6fe616d8308819f6e78fe954
-
SHA1
460b78f22b031ae1710171fe232f254dd2048f1c
-
SHA256
56f2583edfe15a01c1f83269d1b0f9ec58d60e7f1b568c9b834de19aa3e8d35b
-
SHA512
0e598d0638b48a9e79ff4fbdbbd1092056d87db6ee2829b1593045e6f217b15aff784446d8119923d7da52e7a6d7c656a73b3c178eba71d9b474a98da9ac42ad
-
SSDEEP
12288:v6Wq4aaE6KwyF5L0Y2D1PqLE/ZYftCzogvCYoKYr:tthEVaPqLflCzrCYoKYr
Malware Config
Extracted
cybergate
2.6
daff
boucraa.no-ip.org:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_file
Win_Xp.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Please try again later.
-
message_box_title
Error
-
password
abcd1234
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 3316 created 2784 3316 WerFault.exe 87 -
Executes dropped EXE 3 IoCs
pid Process 1360 server.exe 5104 server.exe 2784 Win_Xp.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{218A3Q1V-M05N-O32L-4AM8-MA0JEIMDL4ML}\StubPath = "C:\\Program Files (x86)\\Win_Xp.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{218A3Q1V-M05N-O32L-4AM8-MA0JEIMDL4ML} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{218A3Q1V-M05N-O32L-4AM8-MA0JEIMDL4ML}\StubPath = "C:\\Program Files (x86)\\Win_Xp.exe Restart" server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{218A3Q1V-M05N-O32L-4AM8-MA0JEIMDL4ML} explorer.exe -
resource yara_rule behavioral2/memory/1400-132-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/1400-136-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/1360-138-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral2/memory/1360-143-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/3752-146-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/3752-149-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/1360-153-0x00000000240F0000-0x0000000024152000-memory.dmp upx behavioral2/memory/5104-156-0x00000000240F0000-0x0000000024152000-memory.dmp upx behavioral2/memory/5104-157-0x00000000240F0000-0x0000000024152000-memory.dmp upx behavioral2/memory/3752-158-0x0000000031B90000-0x0000000031B9D000-memory.dmp upx behavioral2/memory/2784-161-0x0000000031BD0000-0x0000000031BDD000-memory.dmp upx behavioral2/memory/2784-162-0x0000000031BD0000-0x0000000031BDD000-memory.dmp upx behavioral2/memory/3316-163-0x0000000031BF0000-0x0000000031BFD000-memory.dmp upx behavioral2/memory/3316-164-0x0000000031BF0000-0x0000000031BFD000-memory.dmp upx behavioral2/memory/4912-165-0x0000000031C20000-0x0000000031C2D000-memory.dmp upx behavioral2/memory/4912-166-0x0000000031C20000-0x0000000031C2D000-memory.dmp upx behavioral2/memory/4912-167-0x0000000031C20000-0x0000000031C2D000-memory.dmp upx behavioral2/memory/2784-168-0x0000000031BD0000-0x0000000031BDD000-memory.dmp upx behavioral2/memory/5104-169-0x00000000240F0000-0x0000000024152000-memory.dmp upx behavioral2/memory/3752-170-0x0000000031B90000-0x0000000031B9D000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation server.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1400-136-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\ server.exe File created C:\Program Files (x86)\Win_Xp.exe server.exe File opened for modification C:\Program Files (x86)\Win_Xp.exe server.exe File opened for modification C:\Program Files (x86)\Win_Xp.exe server.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4912 2784 WerFault.exe 87 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ server.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe 5104 server.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5104 server.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 5104 server.exe Token: SeDebugPrivilege 5104 server.exe Token: SeRestorePrivilege 4912 WerFault.exe Token: SeBackupPrivilege 4912 WerFault.exe Token: SeBackupPrivilege 4912 WerFault.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1360 server.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1400 wrote to memory of 1360 1400 56f2583edfe15a01c1f83269d1b0f9ec58d60e7f1b568c9b834de19aa3e8d35b.exe 81 PID 1400 wrote to memory of 1360 1400 56f2583edfe15a01c1f83269d1b0f9ec58d60e7f1b568c9b834de19aa3e8d35b.exe 81 PID 1400 wrote to memory of 1360 1400 56f2583edfe15a01c1f83269d1b0f9ec58d60e7f1b568c9b834de19aa3e8d35b.exe 81 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48 PID 1360 wrote to memory of 3032 1360 server.exe 48
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:676
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:588
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:312
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:800
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:784
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3284
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3436
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4700
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4472
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:1900
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe2⤵PID:640
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:4204
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3736
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:3520
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3372
-
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding2⤵PID:4712
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:440
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:868
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1188
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2480
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1228
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1196
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1404
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1864
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2096
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2552
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2764
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:1524
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s W32Time1⤵PID:2340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4600
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4520
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:460
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4072
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:4304
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:2688
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\56f2583edfe15a01c1f83269d1b0f9ec58d60e7f1b568c9b834de19aa3e8d35b.exe"C:\Users\Admin\AppData\Local\Temp\56f2583edfe15a01c1f83269d1b0f9ec58d60e7f1b568c9b834de19aa3e8d35b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\server.exeC:\Users\Admin\AppData\Local\Temp/server.exe3⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Modifies Installed Components in the registry
PID:3752
-
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:5104 -
C:\Program Files (x86)\Win_Xp.exe"C:\Program Files (x86)\Win_Xp.exe"5⤵
- Executes dropped EXE
PID:2784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 5766⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2776
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2752
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2692
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2560
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2392
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2112
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:1904
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1268
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1984
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1956
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1856
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1804
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1772
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s FontCache1⤵PID:1684
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1584
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1496
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1448
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1320
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1244
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1036
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:732
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:908
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:792
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe cb38f9f26caf72861ec15103aa947c5f 4wQPEUsUckaCtU0XHnfIPA.0.1.0.0.01⤵PID:4880
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:2920
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:3452
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:2252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2784 -ip 27842⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 124 -p 3316 -ip 33162⤵PID:3216
-
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:4436
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:4092
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
301KB
MD579848290da450686a7e7dcadccb6710d
SHA176d08dcaa3637c1d2d371e393fc09b85afe6ba6e
SHA256994ef2a22f389bd25d7f3ceafe5a1f8f1e93a876e33d231aa1ae3c8515da5fa7
SHA5125e4efe3587b7b5d86e5ad26898d99c9358c3a37b30183f72a62b014555afecaccc10585894dabc797b6c2bd86881d472c5a830405fcc7da271ddd497ca7a67f2
-
Filesize
301KB
MD579848290da450686a7e7dcadccb6710d
SHA176d08dcaa3637c1d2d371e393fc09b85afe6ba6e
SHA256994ef2a22f389bd25d7f3ceafe5a1f8f1e93a876e33d231aa1ae3c8515da5fa7
SHA5125e4efe3587b7b5d86e5ad26898d99c9358c3a37b30183f72a62b014555afecaccc10585894dabc797b6c2bd86881d472c5a830405fcc7da271ddd497ca7a67f2
-
Filesize
240KB
MD573102d060d1373a6bf7fd17b504daab4
SHA10ff1477942c4198fda30ce5494bed8b9ebca9661
SHA256fec70c65766c059640bd01a1051aaeaa1d0a747b994f050fac10460f5bf69f64
SHA512a9993bdd7a549262520b8bcbd39e26304c67cdc94e5d2f6503ed8086aec96efbd44dc27f78f46f4dc331b353fcfbb881cfdbe3d24861e3bdb2e12b2165a5e4e7
-
Filesize
301KB
MD579848290da450686a7e7dcadccb6710d
SHA176d08dcaa3637c1d2d371e393fc09b85afe6ba6e
SHA256994ef2a22f389bd25d7f3ceafe5a1f8f1e93a876e33d231aa1ae3c8515da5fa7
SHA5125e4efe3587b7b5d86e5ad26898d99c9358c3a37b30183f72a62b014555afecaccc10585894dabc797b6c2bd86881d472c5a830405fcc7da271ddd497ca7a67f2
-
Filesize
301KB
MD579848290da450686a7e7dcadccb6710d
SHA176d08dcaa3637c1d2d371e393fc09b85afe6ba6e
SHA256994ef2a22f389bd25d7f3ceafe5a1f8f1e93a876e33d231aa1ae3c8515da5fa7
SHA5125e4efe3587b7b5d86e5ad26898d99c9358c3a37b30183f72a62b014555afecaccc10585894dabc797b6c2bd86881d472c5a830405fcc7da271ddd497ca7a67f2
-
Filesize
301KB
MD579848290da450686a7e7dcadccb6710d
SHA176d08dcaa3637c1d2d371e393fc09b85afe6ba6e
SHA256994ef2a22f389bd25d7f3ceafe5a1f8f1e93a876e33d231aa1ae3c8515da5fa7
SHA5125e4efe3587b7b5d86e5ad26898d99c9358c3a37b30183f72a62b014555afecaccc10585894dabc797b6c2bd86881d472c5a830405fcc7da271ddd497ca7a67f2