Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 11:54
Static task
static1
Behavioral task
behavioral1
Sample
23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe
Resource
win10v2004-20220812-en
General
-
Target
23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe
-
Size
746KB
-
MD5
1a1edddace03ddef321c864e150785d1
-
SHA1
fc36161ff998afd44fd15f82c94a48a60ff6a801
-
SHA256
23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987
-
SHA512
2840795eb0961c89db8c87d316cb43a2f94467452868bbfd9ccf06e9d18cf3e6f42eb59eafbbcaaff7962131b66e5e3d74e7df7ac336210e7dd41b1f0956d516
-
SSDEEP
6144:a+nglw9ayQv3ahvyn/PU7O0KXgTTSj9ltfgIg+oaAhIXbO9qsWSM:rjS3Yvyn/0TkLFYsqTM
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe smrss.exe" 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe -
Executes dropped EXE 1 IoCs
pid Process 2740 01133.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\WINDOWS\\system32\\svchost.exe" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\freizer = "C:\\WINDOWS\\system32\\freizer.exe" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\smrss.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Windows\SysWOW64\smrss.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File created C:\WINDOWS\SysWOW64\freizer.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\klist.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\ssvagent.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java-rmi.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\orbd.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\orbd.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\nbexec.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\kinit.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jcmd.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\schemagen.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\tnameserv.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaws.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jp2launcher.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\ktab.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmic.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\keytool.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\tnameserv.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaws.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javacpl.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmc.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\native2ascii.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\rmiregistry.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\rmiregistry.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jjs.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstat.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\kinit.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstack.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\pack200.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.Loader.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ktab.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javac.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\klist.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jjs.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javaws.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_pwa_launcher.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javah.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jabswitch.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\servertool.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmid.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\xjc.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\policytool.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jjs.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\7-Zip\7z.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jar.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javafxpackager.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\svchost.exe 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4716 wrote to memory of 3884 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 80 PID 4716 wrote to memory of 3884 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 80 PID 4716 wrote to memory of 3884 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 80 PID 4716 wrote to memory of 3868 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 81 PID 4716 wrote to memory of 3868 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 81 PID 4716 wrote to memory of 3868 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 81 PID 3868 wrote to memory of 2040 3868 cmd.exe 85 PID 3868 wrote to memory of 2040 3868 cmd.exe 85 PID 3868 wrote to memory of 2040 3868 cmd.exe 85 PID 3884 wrote to memory of 4952 3884 cmd.exe 84 PID 3884 wrote to memory of 4952 3884 cmd.exe 84 PID 3884 wrote to memory of 4952 3884 cmd.exe 84 PID 4716 wrote to memory of 2740 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 86 PID 4716 wrote to memory of 2740 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 86 PID 4716 wrote to memory of 2740 4716 23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe"C:\Users\Admin\AppData\Local\Temp\23ed589b5e30005891dc957cad1efb9df5587512d820b0ed6d9c9cf958a39987.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f3⤵
- Adds Run key to start application
PID:4952
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f3⤵
- Adds Run key to start application
PID:2040
-
-
-
C:\windows\temp\01133.exe"C:\windows\temp\01133.exe"2⤵
- Executes dropped EXE
PID:2740
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD55ff1667abbd26132c3e2784f3c16878e
SHA13e9db39bddb6abad25193633e206c57046e8524e
SHA2568663e8ee4644dfd0fcfac08218092fcc5eeea4a2d55a55bccaca0ab2e70bc65c
SHA5125745a57ae14f3a27db41066895d137418ded8291fd5d33e819ac6cb865c80c2947bb52bec41305bf375606ded11a4d7ad9397cb7fc177b8fdba09d0b8818e60e
-
Filesize
11KB
MD55ff1667abbd26132c3e2784f3c16878e
SHA13e9db39bddb6abad25193633e206c57046e8524e
SHA2568663e8ee4644dfd0fcfac08218092fcc5eeea4a2d55a55bccaca0ab2e70bc65c
SHA5125745a57ae14f3a27db41066895d137418ded8291fd5d33e819ac6cb865c80c2947bb52bec41305bf375606ded11a4d7ad9397cb7fc177b8fdba09d0b8818e60e