Analysis
-
max time kernel
148s -
max time network
186s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:41
Static task
static1
Behavioral task
behavioral1
Sample
8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe
Resource
win10v2004-20220812-en
General
-
Target
8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe
-
Size
178KB
-
MD5
4a05f5a287555306a426e091d5fdf770
-
SHA1
3fab28a236c180d071f054d2ac183ef59ec243c4
-
SHA256
8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba
-
SHA512
586500a7d432315ad3d0ad67c9be4334a5e9d6d2312025762b9c88748d112b6667f13c1f9d4662c18792778381f2faf7a7fcfe594605fc3c8901e8cfda86c9a5
-
SSDEEP
3072:Kw1ucErj94+cpbr5aHNSb34Qpc06482+p4TtM0y13KUwbt:GnIbrUHU9cT4lwMM0ywUwbt
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
msnat6dcf756f.exemsnat6dcf756f.exepid process 1424 msnat6dcf756f.exe 1884 msnat6dcf756f.exe -
Processes:
resource yara_rule behavioral1/memory/952-55-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/952-57-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/952-58-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/952-61-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/952-62-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/952-66-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/952-82-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/1884-85-0x0000000000400000-0x000000000043E000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 764 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\msnat795f37ef = "C:\\Users\\Admin\\AppData\\Local\\Temp\\msnat2c2f1cef.exe" reg.exe -
Drops file in System32 directory 9 IoCs
Processes:
svchost.exe8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357 svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357 svchost.exe File created C:\Windows\SysWOW64\msnat6dcf756f.exe 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe File opened for modification C:\Windows\SysWOW64\msnat6dcf756f.exe 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exemsnat6dcf756f.exedescription pid process target process PID 2028 set thread context of 952 2028 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe PID 1424 set thread context of 1884 1424 msnat6dcf756f.exe msnat6dcf756f.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1B8CA7BE-1633-4594-8014-F7E3DDBB4033}\WpadDecision = "0" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9e-77-05-40-df-35\WpadDecisionReason = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f003c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1B8CA7BE-1633-4594-8014-F7E3DDBB4033}\9e-77-05-40-df-35 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1B8CA7BE-1633-4594-8014-F7E3DDBB4033}\WpadDecisionTime = 50d89eb251ffd801 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1B8CA7BE-1633-4594-8014-F7E3DDBB4033}\WpadNetworkName = "Network 2" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1B8CA7BE-1633-4594-8014-F7E3DDBB4033}\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9e-77-05-40-df-35\WpadDecisionTime = 50d89eb251ffd801 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9e-77-05-40-df-35 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1B8CA7BE-1633-4594-8014-F7E3DDBB4033} svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs svchost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exemsnat6dcf756f.exepid process 2028 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe 2028 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe 1424 msnat6dcf756f.exe 1424 msnat6dcf756f.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exemsnat6dcf756f.exemsnat6dcf756f.exedescription pid process target process PID 2028 wrote to memory of 952 2028 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe PID 2028 wrote to memory of 952 2028 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe PID 2028 wrote to memory of 952 2028 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe PID 2028 wrote to memory of 952 2028 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe PID 2028 wrote to memory of 952 2028 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe PID 2028 wrote to memory of 952 2028 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe PID 2028 wrote to memory of 952 2028 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe PID 2028 wrote to memory of 952 2028 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe PID 952 wrote to memory of 752 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe reg.exe PID 952 wrote to memory of 752 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe reg.exe PID 952 wrote to memory of 752 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe reg.exe PID 952 wrote to memory of 752 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe reg.exe PID 952 wrote to memory of 468 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe reg.exe PID 952 wrote to memory of 468 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe reg.exe PID 952 wrote to memory of 468 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe reg.exe PID 952 wrote to memory of 468 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe reg.exe PID 1424 wrote to memory of 1884 1424 msnat6dcf756f.exe msnat6dcf756f.exe PID 1424 wrote to memory of 1884 1424 msnat6dcf756f.exe msnat6dcf756f.exe PID 1424 wrote to memory of 1884 1424 msnat6dcf756f.exe msnat6dcf756f.exe PID 1424 wrote to memory of 1884 1424 msnat6dcf756f.exe msnat6dcf756f.exe PID 1424 wrote to memory of 1884 1424 msnat6dcf756f.exe msnat6dcf756f.exe PID 1424 wrote to memory of 1884 1424 msnat6dcf756f.exe msnat6dcf756f.exe PID 1424 wrote to memory of 1884 1424 msnat6dcf756f.exe msnat6dcf756f.exe PID 1424 wrote to memory of 1884 1424 msnat6dcf756f.exe msnat6dcf756f.exe PID 952 wrote to memory of 764 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe svchost.exe PID 952 wrote to memory of 764 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe svchost.exe PID 952 wrote to memory of 764 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe svchost.exe PID 952 wrote to memory of 764 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe svchost.exe PID 952 wrote to memory of 764 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe svchost.exe PID 1884 wrote to memory of 992 1884 msnat6dcf756f.exe svchost.exe PID 1884 wrote to memory of 992 1884 msnat6dcf756f.exe svchost.exe PID 1884 wrote to memory of 992 1884 msnat6dcf756f.exe svchost.exe PID 1884 wrote to memory of 992 1884 msnat6dcf756f.exe svchost.exe PID 1884 wrote to memory of 992 1884 msnat6dcf756f.exe svchost.exe PID 1884 wrote to memory of 992 1884 msnat6dcf756f.exe svchost.exe PID 1884 wrote to memory of 992 1884 msnat6dcf756f.exe svchost.exe PID 1884 wrote to memory of 992 1884 msnat6dcf756f.exe svchost.exe PID 1884 wrote to memory of 992 1884 msnat6dcf756f.exe svchost.exe PID 952 wrote to memory of 764 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe svchost.exe PID 952 wrote to memory of 764 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe svchost.exe PID 952 wrote to memory of 764 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe svchost.exe PID 952 wrote to memory of 764 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe svchost.exe PID 952 wrote to memory of 764 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe svchost.exe PID 952 wrote to memory of 764 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe svchost.exe PID 952 wrote to memory of 764 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe svchost.exe PID 952 wrote to memory of 764 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe svchost.exe PID 1884 wrote to memory of 992 1884 msnat6dcf756f.exe svchost.exe PID 1884 wrote to memory of 992 1884 msnat6dcf756f.exe svchost.exe PID 1884 wrote to memory of 992 1884 msnat6dcf756f.exe svchost.exe PID 1884 wrote to memory of 992 1884 msnat6dcf756f.exe svchost.exe PID 1884 wrote to memory of 992 1884 msnat6dcf756f.exe svchost.exe PID 1884 wrote to memory of 992 1884 msnat6dcf756f.exe svchost.exe PID 1884 wrote to memory of 992 1884 msnat6dcf756f.exe svchost.exe PID 1884 wrote to memory of 992 1884 msnat6dcf756f.exe svchost.exe PID 952 wrote to memory of 764 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe svchost.exe PID 952 wrote to memory of 764 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe svchost.exe PID 952 wrote to memory of 764 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe svchost.exe PID 952 wrote to memory of 764 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe svchost.exe PID 952 wrote to memory of 764 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe svchost.exe PID 952 wrote to memory of 764 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe svchost.exe PID 952 wrote to memory of 764 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe svchost.exe PID 952 wrote to memory of 764 952 8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe svchost.exe PID 1884 wrote to memory of 992 1884 msnat6dcf756f.exe svchost.exe PID 1884 wrote to memory of 992 1884 msnat6dcf756f.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe"C:\Users\Admin\AppData\Local\Temp\8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe"C:\Users\Admin\AppData\Local\Temp\8f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba.exe"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\reg.exereg.exe add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows" /t REG_SZ /f /v load /d "C:\Users\Admin\AppData\Local\Temp\msnat2c2f1cef.exe"3⤵PID:752
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /t REG_SZ /f /v msnat795f37ef /d "C:\Users\Admin\AppData\Local\Temp\msnat2c2f1cef.exe"3⤵
- Adds Run key to start application
PID:468 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Deletes itself
PID:764
-
C:\Windows\SysWOW64\msnat6dcf756f.exeC:\Windows\SysWOW64\msnat6dcf756f.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\msnat6dcf756f.exeC:\Windows\SysWOW64\msnat6dcf756f.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:992
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD54a05f5a287555306a426e091d5fdf770
SHA13fab28a236c180d071f054d2ac183ef59ec243c4
SHA2568f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba
SHA512586500a7d432315ad3d0ad67c9be4334a5e9d6d2312025762b9c88748d112b6667f13c1f9d4662c18792778381f2faf7a7fcfe594605fc3c8901e8cfda86c9a5
-
Filesize
178KB
MD54a05f5a287555306a426e091d5fdf770
SHA13fab28a236c180d071f054d2ac183ef59ec243c4
SHA2568f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba
SHA512586500a7d432315ad3d0ad67c9be4334a5e9d6d2312025762b9c88748d112b6667f13c1f9d4662c18792778381f2faf7a7fcfe594605fc3c8901e8cfda86c9a5
-
Filesize
178KB
MD54a05f5a287555306a426e091d5fdf770
SHA13fab28a236c180d071f054d2ac183ef59ec243c4
SHA2568f1ccc02e99adc67b76a316c35aa86d1f52ffc2347b719d00faed8e80b9268ba
SHA512586500a7d432315ad3d0ad67c9be4334a5e9d6d2312025762b9c88748d112b6667f13c1f9d4662c18792778381f2faf7a7fcfe594605fc3c8901e8cfda86c9a5