Analysis
-
max time kernel
150s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe
Resource
win10v2004-20220812-en
General
-
Target
ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe
-
Size
1.6MB
-
MD5
073676f4808c9f4b936919fa40ff647d
-
SHA1
c71d46f804b1a05da52a31576915f0c084efca23
-
SHA256
ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd
-
SHA512
cab98b867e550580cac44f053dc2a481b5d1194eb4467e82ed86a59b91ebd3a4fc9c02209d3cbc8c982b53e3c6675116cb1d8b4b4ee53ac55f09f7b276435546
-
SSDEEP
49152:4p/5Ubd+WdBw4ptu63RnJB++++SM5D1JG1+0KM//M8++B+++++a+++x+Sg4+ItpL:Y/WdBw4ptu63RnJB++++SM5D1JG1+0Kn
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe -
Executes dropped EXE 6 IoCs
pid Process 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 524 icsys.icn.exe 1520 explorer.exe 1488 spoolsv.exe 1568 svchost.exe 1944 spoolsv.exe -
resource yara_rule behavioral1/memory/1168-62-0x0000000002570000-0x00000000035FE000-memory.dmp upx behavioral1/memory/1168-68-0x0000000002570000-0x00000000035FE000-memory.dmp upx -
Loads dropped DLL 12 IoCs
pid Process 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 524 icsys.icn.exe 524 icsys.icn.exe 1520 explorer.exe 1520 explorer.exe 1488 spoolsv.exe 1488 spoolsv.exe 1568 svchost.exe 1568 svchost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe File opened for modification C:\Windows\SYSTEM.INI ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1016 schtasks.exe 828 schtasks.exe 764 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 524 icsys.icn.exe 524 icsys.icn.exe 524 icsys.icn.exe 524 icsys.icn.exe 524 icsys.icn.exe 524 icsys.icn.exe 524 icsys.icn.exe 524 icsys.icn.exe 524 icsys.icn.exe 524 icsys.icn.exe 524 icsys.icn.exe 524 icsys.icn.exe 524 icsys.icn.exe 524 icsys.icn.exe 524 icsys.icn.exe 524 icsys.icn.exe 524 icsys.icn.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1520 explorer.exe 1568 svchost.exe 1568 svchost.exe 1568 svchost.exe 1568 svchost.exe 1568 svchost.exe 1568 svchost.exe 1568 svchost.exe 1568 svchost.exe 1568 svchost.exe 1568 svchost.exe 1568 svchost.exe 1568 svchost.exe 1568 svchost.exe 1568 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1520 explorer.exe 1568 svchost.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Token: SeDebugPrivilege 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Token: SeDebugPrivilege 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Token: SeDebugPrivilege 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Token: SeDebugPrivilege 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Token: SeDebugPrivilege 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Token: SeDebugPrivilege 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Token: SeDebugPrivilege 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Token: SeDebugPrivilege 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Token: SeDebugPrivilege 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Token: SeDebugPrivilege 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Token: SeDebugPrivilege 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Token: SeDebugPrivilege 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Token: SeDebugPrivilege 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Token: SeDebugPrivilege 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Token: SeDebugPrivilege 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Token: SeDebugPrivilege 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Token: SeDebugPrivilege 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Token: SeDebugPrivilege 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe Token: 33 2000 mmc.exe Token: SeIncBasePriorityPrivilege 2000 mmc.exe Token: 33 2000 mmc.exe Token: SeIncBasePriorityPrivilege 2000 mmc.exe Token: 33 2000 mmc.exe Token: SeIncBasePriorityPrivilege 2000 mmc.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 524 icsys.icn.exe 524 icsys.icn.exe 2000 mmc.exe 1520 explorer.exe 2000 mmc.exe 1520 explorer.exe 1488 spoolsv.exe 1488 spoolsv.exe 1568 svchost.exe 1568 svchost.exe 1944 spoolsv.exe 1944 spoolsv.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1168 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 26 PID 2016 wrote to memory of 1168 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 26 PID 2016 wrote to memory of 1168 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 26 PID 2016 wrote to memory of 1168 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 26 PID 1168 wrote to memory of 1244 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 16 PID 1168 wrote to memory of 1332 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 10 PID 1168 wrote to memory of 1368 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 15 PID 1168 wrote to memory of 2016 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 25 PID 1168 wrote to memory of 2016 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 25 PID 1168 wrote to memory of 2000 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 27 PID 1168 wrote to memory of 2000 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 27 PID 1168 wrote to memory of 2000 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 27 PID 1168 wrote to memory of 2000 1168 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 27 PID 2016 wrote to memory of 524 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 28 PID 2016 wrote to memory of 524 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 28 PID 2016 wrote to memory of 524 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 28 PID 2016 wrote to memory of 524 2016 ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe 28 PID 524 wrote to memory of 1520 524 icsys.icn.exe 29 PID 524 wrote to memory of 1520 524 icsys.icn.exe 29 PID 524 wrote to memory of 1520 524 icsys.icn.exe 29 PID 524 wrote to memory of 1520 524 icsys.icn.exe 29 PID 1520 wrote to memory of 1488 1520 explorer.exe 30 PID 1520 wrote to memory of 1488 1520 explorer.exe 30 PID 1520 wrote to memory of 1488 1520 explorer.exe 30 PID 1520 wrote to memory of 1488 1520 explorer.exe 30 PID 1488 wrote to memory of 1568 1488 spoolsv.exe 31 PID 1488 wrote to memory of 1568 1488 spoolsv.exe 31 PID 1488 wrote to memory of 1568 1488 spoolsv.exe 31 PID 1488 wrote to memory of 1568 1488 spoolsv.exe 31 PID 1568 wrote to memory of 1944 1568 svchost.exe 32 PID 1568 wrote to memory of 1944 1568 svchost.exe 32 PID 1568 wrote to memory of 1944 1568 svchost.exe 32 PID 1568 wrote to memory of 1944 1568 svchost.exe 32 PID 1520 wrote to memory of 288 1520 explorer.exe 33 PID 1520 wrote to memory of 288 1520 explorer.exe 33 PID 1520 wrote to memory of 288 1520 explorer.exe 33 PID 1520 wrote to memory of 288 1520 explorer.exe 33 PID 1568 wrote to memory of 1016 1568 svchost.exe 34 PID 1568 wrote to memory of 1016 1568 svchost.exe 34 PID 1568 wrote to memory of 1016 1568 svchost.exe 34 PID 1568 wrote to memory of 1016 1568 svchost.exe 34 PID 1568 wrote to memory of 828 1568 svchost.exe 37 PID 1568 wrote to memory of 828 1568 svchost.exe 37 PID 1568 wrote to memory of 828 1568 svchost.exe 37 PID 1568 wrote to memory of 828 1568 svchost.exe 37 PID 1568 wrote to memory of 764 1568 svchost.exe 39 PID 1568 wrote to memory of 764 1568 svchost.exe 39 PID 1568 wrote to memory of 764 1568 svchost.exe 39 PID 1568 wrote to memory of 764 1568 svchost.exe 39 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1332
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe"C:\Users\Admin\AppData\Local\Temp\ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
\??\c:\users\admin\appdata\local\temp\ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exec:\users\admin\appdata\local\temp\ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1168 -
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2000
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:524 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe6⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1568 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1944
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 01:18 /f7⤵
- Creates scheduled task(s)
PID:1016
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 01:19 /f7⤵
- Creates scheduled task(s)
PID:828
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 01:20 /f7⤵
- Creates scheduled task(s)
PID:764
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe5⤵PID:288
-
-
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1244
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe
Filesize1.4MB
MD5fc5b377e6622849e59b86354f805f296
SHA1e34a419d968d939c9c7910917d3599456e6c86f7
SHA256070f27afc6522274eb3eb4f53159601bee1998ed5446d0b903efb4f3193de596
SHA512120be2ad772e543e11ef1b4ef4e14b0170e20dad3dad46eac162c9a9d14aa1d2195609bf371c0c3a396a02a86612bc927a053840c8e2b1a2e68f8cb8fe9d03c6
-
Filesize
215KB
MD54ef5f790eb6a746616c65bcf0d9264d4
SHA1f8210e718cafe04e89a23f53aee56855337893a5
SHA2566967b95019981702a6d78b066999af717a19dbd5634e2ea444b674d67db1028c
SHA512c6ccdf21eec3f8a968fa92ab0e55d3cc9ccb3a062a7ddd436624ebcfd3aeb7ed38ab2edd50a8564c5e335f4ad0b53fe4142313d3440ef7c85b40cac6713d8b57
-
Filesize
215KB
MD501e080311f8c53a9a480cce15a6cc081
SHA1b05f9d24a1c50081065293b5db724b11bccecaea
SHA256ab4fb9e9411af1ec95ba64eeb1436dbc6d86b77b99566e972169948e8bc5f0f1
SHA512aa27909b3ad8f9848ae1171b888c1add28b8fadcfa6f9b7412443ef1e1d5767ac11dcf71631fd352864732131e0ff2acb5e37928e9361e20d317887f4652d319
-
Filesize
215KB
MD5654b26ead67f849c894672edadef533c
SHA1ed168f18858f0c5601f5c4708e9bfa420e6e91a6
SHA25645e8572a9f94c2fadac3b6fe00eba9ac0ef7a14675ccd646d2b9ec9d91e615a1
SHA5126bc605fd765beea735788e306b90c0208db0ba5d7bc314cf4a7822cca869f7486d66414966d3f4ccc109c6c9dc8761e84e15c3abf995b5538c8ce325567f2c91
-
Filesize
215KB
MD5654b26ead67f849c894672edadef533c
SHA1ed168f18858f0c5601f5c4708e9bfa420e6e91a6
SHA25645e8572a9f94c2fadac3b6fe00eba9ac0ef7a14675ccd646d2b9ec9d91e615a1
SHA5126bc605fd765beea735788e306b90c0208db0ba5d7bc314cf4a7822cca869f7486d66414966d3f4ccc109c6c9dc8761e84e15c3abf995b5538c8ce325567f2c91
-
Filesize
215KB
MD53d0109b83e9af1a1656adf5c4e801134
SHA1fa3873c4b949ac7aa24e15db6eea09574090049f
SHA2563a03f66cfb5920e10727668b3b1f945d22e22d461a9ffcd6ab92bdb1bd95eb9e
SHA512f01d1bf539ff93f0f0a3b9ddc7260c37a27cf8842ff11a3a7fe3ecf0513f32b2249f4e003ba7b7968c57f2cd0adbe0d4683448442f41962670ef845544e57dd3
-
\??\c:\users\admin\appdata\local\temp\ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe
Filesize1.4MB
MD5fc5b377e6622849e59b86354f805f296
SHA1e34a419d968d939c9c7910917d3599456e6c86f7
SHA256070f27afc6522274eb3eb4f53159601bee1998ed5446d0b903efb4f3193de596
SHA512120be2ad772e543e11ef1b4ef4e14b0170e20dad3dad46eac162c9a9d14aa1d2195609bf371c0c3a396a02a86612bc927a053840c8e2b1a2e68f8cb8fe9d03c6
-
Filesize
215KB
MD5654b26ead67f849c894672edadef533c
SHA1ed168f18858f0c5601f5c4708e9bfa420e6e91a6
SHA25645e8572a9f94c2fadac3b6fe00eba9ac0ef7a14675ccd646d2b9ec9d91e615a1
SHA5126bc605fd765beea735788e306b90c0208db0ba5d7bc314cf4a7822cca869f7486d66414966d3f4ccc109c6c9dc8761e84e15c3abf995b5538c8ce325567f2c91
-
Filesize
215KB
MD53d0109b83e9af1a1656adf5c4e801134
SHA1fa3873c4b949ac7aa24e15db6eea09574090049f
SHA2563a03f66cfb5920e10727668b3b1f945d22e22d461a9ffcd6ab92bdb1bd95eb9e
SHA512f01d1bf539ff93f0f0a3b9ddc7260c37a27cf8842ff11a3a7fe3ecf0513f32b2249f4e003ba7b7968c57f2cd0adbe0d4683448442f41962670ef845544e57dd3
-
Filesize
215KB
MD54ef5f790eb6a746616c65bcf0d9264d4
SHA1f8210e718cafe04e89a23f53aee56855337893a5
SHA2566967b95019981702a6d78b066999af717a19dbd5634e2ea444b674d67db1028c
SHA512c6ccdf21eec3f8a968fa92ab0e55d3cc9ccb3a062a7ddd436624ebcfd3aeb7ed38ab2edd50a8564c5e335f4ad0b53fe4142313d3440ef7c85b40cac6713d8b57
-
Filesize
215KB
MD501e080311f8c53a9a480cce15a6cc081
SHA1b05f9d24a1c50081065293b5db724b11bccecaea
SHA256ab4fb9e9411af1ec95ba64eeb1436dbc6d86b77b99566e972169948e8bc5f0f1
SHA512aa27909b3ad8f9848ae1171b888c1add28b8fadcfa6f9b7412443ef1e1d5767ac11dcf71631fd352864732131e0ff2acb5e37928e9361e20d317887f4652d319
-
\Users\Admin\AppData\Local\Temp\ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe
Filesize1.4MB
MD5fc5b377e6622849e59b86354f805f296
SHA1e34a419d968d939c9c7910917d3599456e6c86f7
SHA256070f27afc6522274eb3eb4f53159601bee1998ed5446d0b903efb4f3193de596
SHA512120be2ad772e543e11ef1b4ef4e14b0170e20dad3dad46eac162c9a9d14aa1d2195609bf371c0c3a396a02a86612bc927a053840c8e2b1a2e68f8cb8fe9d03c6
-
\Users\Admin\AppData\Local\Temp\ad56812b6bd4014581b826824c25728b6e839dc847b00a0c98461055e78684dd.exe
Filesize1.4MB
MD5fc5b377e6622849e59b86354f805f296
SHA1e34a419d968d939c9c7910917d3599456e6c86f7
SHA256070f27afc6522274eb3eb4f53159601bee1998ed5446d0b903efb4f3193de596
SHA512120be2ad772e543e11ef1b4ef4e14b0170e20dad3dad46eac162c9a9d14aa1d2195609bf371c0c3a396a02a86612bc927a053840c8e2b1a2e68f8cb8fe9d03c6
-
Filesize
215KB
MD54ef5f790eb6a746616c65bcf0d9264d4
SHA1f8210e718cafe04e89a23f53aee56855337893a5
SHA2566967b95019981702a6d78b066999af717a19dbd5634e2ea444b674d67db1028c
SHA512c6ccdf21eec3f8a968fa92ab0e55d3cc9ccb3a062a7ddd436624ebcfd3aeb7ed38ab2edd50a8564c5e335f4ad0b53fe4142313d3440ef7c85b40cac6713d8b57
-
Filesize
215KB
MD54ef5f790eb6a746616c65bcf0d9264d4
SHA1f8210e718cafe04e89a23f53aee56855337893a5
SHA2566967b95019981702a6d78b066999af717a19dbd5634e2ea444b674d67db1028c
SHA512c6ccdf21eec3f8a968fa92ab0e55d3cc9ccb3a062a7ddd436624ebcfd3aeb7ed38ab2edd50a8564c5e335f4ad0b53fe4142313d3440ef7c85b40cac6713d8b57
-
Filesize
215KB
MD501e080311f8c53a9a480cce15a6cc081
SHA1b05f9d24a1c50081065293b5db724b11bccecaea
SHA256ab4fb9e9411af1ec95ba64eeb1436dbc6d86b77b99566e972169948e8bc5f0f1
SHA512aa27909b3ad8f9848ae1171b888c1add28b8fadcfa6f9b7412443ef1e1d5767ac11dcf71631fd352864732131e0ff2acb5e37928e9361e20d317887f4652d319
-
Filesize
215KB
MD501e080311f8c53a9a480cce15a6cc081
SHA1b05f9d24a1c50081065293b5db724b11bccecaea
SHA256ab4fb9e9411af1ec95ba64eeb1436dbc6d86b77b99566e972169948e8bc5f0f1
SHA512aa27909b3ad8f9848ae1171b888c1add28b8fadcfa6f9b7412443ef1e1d5767ac11dcf71631fd352864732131e0ff2acb5e37928e9361e20d317887f4652d319
-
Filesize
215KB
MD5654b26ead67f849c894672edadef533c
SHA1ed168f18858f0c5601f5c4708e9bfa420e6e91a6
SHA25645e8572a9f94c2fadac3b6fe00eba9ac0ef7a14675ccd646d2b9ec9d91e615a1
SHA5126bc605fd765beea735788e306b90c0208db0ba5d7bc314cf4a7822cca869f7486d66414966d3f4ccc109c6c9dc8761e84e15c3abf995b5538c8ce325567f2c91
-
Filesize
215KB
MD5654b26ead67f849c894672edadef533c
SHA1ed168f18858f0c5601f5c4708e9bfa420e6e91a6
SHA25645e8572a9f94c2fadac3b6fe00eba9ac0ef7a14675ccd646d2b9ec9d91e615a1
SHA5126bc605fd765beea735788e306b90c0208db0ba5d7bc314cf4a7822cca869f7486d66414966d3f4ccc109c6c9dc8761e84e15c3abf995b5538c8ce325567f2c91
-
Filesize
215KB
MD5654b26ead67f849c894672edadef533c
SHA1ed168f18858f0c5601f5c4708e9bfa420e6e91a6
SHA25645e8572a9f94c2fadac3b6fe00eba9ac0ef7a14675ccd646d2b9ec9d91e615a1
SHA5126bc605fd765beea735788e306b90c0208db0ba5d7bc314cf4a7822cca869f7486d66414966d3f4ccc109c6c9dc8761e84e15c3abf995b5538c8ce325567f2c91
-
Filesize
215KB
MD5654b26ead67f849c894672edadef533c
SHA1ed168f18858f0c5601f5c4708e9bfa420e6e91a6
SHA25645e8572a9f94c2fadac3b6fe00eba9ac0ef7a14675ccd646d2b9ec9d91e615a1
SHA5126bc605fd765beea735788e306b90c0208db0ba5d7bc314cf4a7822cca869f7486d66414966d3f4ccc109c6c9dc8761e84e15c3abf995b5538c8ce325567f2c91
-
Filesize
215KB
MD53d0109b83e9af1a1656adf5c4e801134
SHA1fa3873c4b949ac7aa24e15db6eea09574090049f
SHA2563a03f66cfb5920e10727668b3b1f945d22e22d461a9ffcd6ab92bdb1bd95eb9e
SHA512f01d1bf539ff93f0f0a3b9ddc7260c37a27cf8842ff11a3a7fe3ecf0513f32b2249f4e003ba7b7968c57f2cd0adbe0d4683448442f41962670ef845544e57dd3
-
Filesize
215KB
MD53d0109b83e9af1a1656adf5c4e801134
SHA1fa3873c4b949ac7aa24e15db6eea09574090049f
SHA2563a03f66cfb5920e10727668b3b1f945d22e22d461a9ffcd6ab92bdb1bd95eb9e
SHA512f01d1bf539ff93f0f0a3b9ddc7260c37a27cf8842ff11a3a7fe3ecf0513f32b2249f4e003ba7b7968c57f2cd0adbe0d4683448442f41962670ef845544e57dd3