Analysis
-
max time kernel
150s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21-11-2022 15:57
Behavioral task
behavioral1
Sample
d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe
Resource
win10v2004-20221111-en
General
-
Target
d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe
-
Size
284KB
-
MD5
193405676d996ea5dbb5442293f2a0d6
-
SHA1
6a38ba3d2c4356b718cae935fc97bd423a3e0d2f
-
SHA256
d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4
-
SHA512
33a25f42c2d028a5ce8c53537064e94d569873e65c3b4faa102eed29a0a6bea9cc0e437d7b22a333661e86028b55d9b93c00c3d24003c6615b1878d5bde320f7
-
SSDEEP
6144:auMJWY+qaHEQCcYfSBYJbQCjRcqESEgm6Anhc1kG6EmRzx:a+YcUc6SBLLTSEgBAnhc1kGsx
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe NOTEPAD1.exe" d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe -
Disables Task Manager via registry modification
-
Modifies Installed Components in the registry 2 TTPs 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
resource yara_rule behavioral1/memory/1528-58-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral1/memory/1528-63-0x0000000000400000-0x00000000004A5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\NOTEPAD1.exe" d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\s: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\u: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\b: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\e: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\h: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\o: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\k: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\l: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\m: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\q: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\r: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\t: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\v: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\w: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\a: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\i: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\p: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\x: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\z: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\n: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\y: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\f: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\g: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\j: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1528-58-0x0000000000400000-0x00000000004A5000-memory.dmp autoit_exe behavioral1/memory/1528-63-0x0000000000400000-0x00000000004A5000-memory.dmp autoit_exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\NOTEPAD1.exe d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File created C:\Windows\SysWOW64\WORD.exe d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened for modification C:\Windows\SysWOW64\WORD.exe d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened for modification C:\Windows\SysWOW64\autorun.ini d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File created C:\Windows\SysWOW64\NOTEPAD1.exe d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\NOTEPAD1.exe d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened for modification C:\Windows\NOTEPAD1.exe d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 40 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1496 explorer.exe Token: SeShutdownPrivilege 1496 explorer.exe Token: SeShutdownPrivilege 1496 explorer.exe Token: SeShutdownPrivilege 1496 explorer.exe Token: SeShutdownPrivilege 1496 explorer.exe Token: SeShutdownPrivilege 1496 explorer.exe Token: SeShutdownPrivilege 1496 explorer.exe Token: SeShutdownPrivilege 1496 explorer.exe Token: SeShutdownPrivilege 1496 explorer.exe Token: SeShutdownPrivilege 1496 explorer.exe Token: 33 1688 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1688 AUDIODG.EXE Token: 33 1688 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1688 AUDIODG.EXE Token: SeShutdownPrivilege 1496 explorer.exe Token: SeShutdownPrivilege 1496 explorer.exe Token: SeShutdownPrivilege 1160 explorer.exe Token: SeShutdownPrivilege 1160 explorer.exe Token: SeShutdownPrivilege 1160 explorer.exe Token: SeShutdownPrivilege 1160 explorer.exe Token: SeShutdownPrivilege 1160 explorer.exe Token: SeShutdownPrivilege 1160 explorer.exe Token: SeShutdownPrivilege 1160 explorer.exe Token: SeShutdownPrivilege 1160 explorer.exe Token: SeShutdownPrivilege 1160 explorer.exe Token: SeShutdownPrivilege 1160 explorer.exe Token: SeShutdownPrivilege 1160 explorer.exe Token: SeShutdownPrivilege 1160 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1264 explorer.exe Token: SeShutdownPrivilege 1428 explorer.exe Token: SeShutdownPrivilege 1428 explorer.exe Token: SeShutdownPrivilege 1428 explorer.exe Token: SeShutdownPrivilege 1428 explorer.exe Token: SeShutdownPrivilege 1428 explorer.exe Token: SeShutdownPrivilege 1428 explorer.exe Token: SeShutdownPrivilege 1428 explorer.exe Token: SeShutdownPrivilege 1428 explorer.exe Token: SeShutdownPrivilege 1428 explorer.exe Token: SeShutdownPrivilege 1428 explorer.exe Token: SeShutdownPrivilege 1428 explorer.exe Token: SeShutdownPrivilege 1428 explorer.exe Token: SeShutdownPrivilege 1300 explorer.exe Token: SeShutdownPrivilege 1300 explorer.exe Token: SeShutdownPrivilege 1300 explorer.exe Token: SeShutdownPrivilege 1300 explorer.exe Token: SeShutdownPrivilege 1300 explorer.exe Token: SeShutdownPrivilege 1300 explorer.exe Token: SeShutdownPrivilege 1300 explorer.exe Token: SeShutdownPrivilege 1300 explorer.exe Token: SeShutdownPrivilege 1300 explorer.exe Token: SeShutdownPrivilege 1300 explorer.exe Token: SeShutdownPrivilege 1300 explorer.exe Token: SeShutdownPrivilege 1300 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1496 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1264 explorer.exe 1428 explorer.exe 1428 explorer.exe 1428 explorer.exe 1428 explorer.exe 1428 explorer.exe 1428 explorer.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1528 wrote to memory of 1724 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 28 PID 1528 wrote to memory of 1724 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 28 PID 1528 wrote to memory of 1724 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 28 PID 1528 wrote to memory of 1724 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 28 PID 1724 wrote to memory of 1532 1724 cmd.exe 30 PID 1724 wrote to memory of 1532 1724 cmd.exe 30 PID 1724 wrote to memory of 1532 1724 cmd.exe 30 PID 1724 wrote to memory of 1532 1724 cmd.exe 30 PID 1528 wrote to memory of 692 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 31 PID 1528 wrote to memory of 692 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 31 PID 1528 wrote to memory of 692 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 31 PID 1528 wrote to memory of 692 1528 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 31 PID 692 wrote to memory of 1048 692 cmd.exe 33 PID 692 wrote to memory of 1048 692 cmd.exe 33 PID 692 wrote to memory of 1048 692 cmd.exe 33 PID 692 wrote to memory of 1048 692 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe"C:\Users\Admin\AppData\Local\Temp\d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:1532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\WORD.exe2⤵
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\WORD.exe3⤵PID:1048
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1496
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5481⤵
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1160
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1264
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:1428
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
PID:1532
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
PID:1572
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
PID:436
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
PID:1360