Analysis
-
max time kernel
208s -
max time network
288s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:28
Static task
static1
Behavioral task
behavioral1
Sample
c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe
Resource
win10v2004-20220901-en
General
-
Target
c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe
-
Size
3.2MB
-
MD5
60d87145479d73dae26ffdce16c1a071
-
SHA1
0206ace501f3760edf5be079951fcadd17c52c7b
-
SHA256
c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63
-
SHA512
cb90cc27e5f53e2b00e187d203191ef76e432592a5de1c2ca820b920c90e4b9999925da0ac25ed0890e360e7f3baa694003ffa811b45cdf96d74cb4833e57195
-
SSDEEP
98304:xFNW00i+rCrOZk8mXENd5VY8ScDnOsahMtAnZ:x9Tg4OZkdXEv0wODhMM
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Windows Up.EXEWindows Up.EXEpid process 1800 Windows Up.EXE 1780 Windows Up.EXE -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exeWindows Up.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Windows Up.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Windows Up.EXE -
Loads dropped DLL 2 IoCs
Processes:
c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exepid process 544 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe 544 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Windows Up.EXEdescription ioc process Key created \REGISTRY\MACHINE\software\Wow6432Node\microsoft\windows\currentversion\run\ Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update = "c:\\Program Files\\Javascript\\Windows Up.EXE" Windows Up.EXE -
Drops file in Program Files directory 4 IoCs
Processes:
c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exeWindows Up.EXEdescription ioc process File created \??\c:\Program Files\Javascript\win_pdf.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe File created \??\c:\Program Files\Javascript\Windows Up.EXE c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe File opened for modification \??\c:\Program Files\Javascript\lgfiles Windows Up.EXE File opened for modification \??\c:\Program Files\Javascript\Windows Up.EXE Windows Up.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 39 IoCs
Processes:
Windows Up.EXEc219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ybxmn\ = "XvwK{oCueg{RVt]iRX`HeI" Windows Up.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ZlhnsafnExocf Windows Up.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\oNgz Windows Up.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\drsdOjDctzQr Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\huaPtcgtF\ = "g`_N@KqD_T" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ybxmn\ = "XvwK{oCueg{RVt]iRX`HdI" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32\ = "%systemroot%\\SysWow64\\cewmdm.dll" c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ybxmn\ = "XvwK{oCueg{RVt]iRX`HfI" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\drsdOjDctzQr\ = "m}}NaWehuzvH|Gj^m]wHZTMH" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ybxmn\ = "XvwK{oCueg{RVt]iRX`HgI" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\huaPtcgtF\ = "g`_NFpFOgP" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\VersionIndependentProgID\ = "WMDMCESP.WMDMCESP" c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ybxmn\ = "XvwK{oCueg{RVt]iRX`HhI" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\huaPtcgtF\ = "g`_N@iKSqh" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\drsdOjDctzQr\ = "mymNaWehuzvH|Gj^m]wHZTMH" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\lnYty\ = "mFU_FMlfgXi@iTMWm" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32\ThreadingModel = "Free" c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ProgID c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\VersionIndependentProgID c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\xavS Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\huaPtcgtF\ = "g`_NLntwDl" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\huaPtcgtF\ = "g`_NAhccLd" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ = "WMDM CE Device Service Provider" c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\lnYty Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ZlhnsafnExocf\ = "H[bKBQeTvYoy^}iUBD}zt" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\drsdOjDctzQr\ = "m|mNaWehuzvH|Gj^m]wHZTMH" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ybxmn\ = "XvwK{oCueg{RVt]iRX`HiI" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\drsdOjDctzQr\ = "mr}NaWehuzvH|Gj^m]wHZTMH" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqsnfuwwfa\ = "pXMblZ~^aTCqd{XBjw}JxDiR_" Windows Up.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\huaPtcgtF Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\oNgz\ = "Wc_v\x7f@krb{nAv{STJ\\AUlIBvMb" Windows Up.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqsnfuwwfa Windows Up.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ProgID\ = "WMDMCESP.WMDMCESP.1" c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\xavS\ = "ri\x7fmXj|\\Ig\x7fNDwVwPJ@LdNet|o" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\oNgz\ = "Wc_v\x7f@krb{nAF{STJ\\AU\\IBvMb" Windows Up.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ybxmn Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\huaPtcgtF\ = "g`_NGazH{|" Windows Up.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA} c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe -
NTFS ADS 2 IoCs
Processes:
Windows Up.EXEdescription ioc process File opened for modification C:\ProgramData\TEMP:C980DA7D Windows Up.EXE File created C:\ProgramData\TEMP:C980DA7D Windows Up.EXE -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exeWindows Up.EXEdescription pid process Token: 33 544 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Token: SeIncBasePriorityPrivilege 544 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Token: 33 544 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Token: SeIncBasePriorityPrivilege 544 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Token: 33 1780 Windows Up.EXE Token: SeIncBasePriorityPrivilege 1780 Windows Up.EXE Token: 33 1780 Windows Up.EXE Token: SeIncBasePriorityPrivilege 1780 Windows Up.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Windows Up.EXEpid process 1780 Windows Up.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exedescription pid process target process PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 1796 wrote to memory of 544 1796 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe"C:\Users\Admin\AppData\Local\Temp\c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe"C:\Users\Admin\AppData\Local\Temp\c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe"2⤵
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:544 -
\??\c:\Program Files\Javascript\Windows Up.EXE"c:\Program Files\Javascript\Windows Up.EXE"3⤵
- Executes dropped EXE
PID:1800 -
\??\c:\Program Files\Javascript\Windows Up.EXE"c:\Program Files\Javascript\Windows Up.EXE"4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1780
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD506fc08f4f00dc5e98e498e3e99859a77
SHA16177caa516a7aa72746bb4607364acfc572174cf
SHA2566dd5cba03075fdb4c555e718c2d80877aed428836dda6ba9d05af4dee7a76d56
SHA51213f744fdf416c95e367d6088e21dc08be2d54e13dbf48bcfba5defc2e22fcf63bc558bf2a44c10016cda787eb1ab7379b1a862b18e6221879be64cef80f25865
-
Filesize
2.0MB
MD506fc08f4f00dc5e98e498e3e99859a77
SHA16177caa516a7aa72746bb4607364acfc572174cf
SHA2566dd5cba03075fdb4c555e718c2d80877aed428836dda6ba9d05af4dee7a76d56
SHA51213f744fdf416c95e367d6088e21dc08be2d54e13dbf48bcfba5defc2e22fcf63bc558bf2a44c10016cda787eb1ab7379b1a862b18e6221879be64cef80f25865
-
Filesize
127B
MD56a360392f66d6f84b38a9270d533640b
SHA1b65502a9dcd9d287e5ac32060c02294623387f77
SHA256e94e3a414283e1090a11b71519dd1ca27f49d139b157ef16e5cc6277ba0f541c
SHA512c72e571678ee67f03b66e718455fd1884f35c49f5fcb28f39936e2e5b0c1e09373f2c6fc5005cbb57fb4f488105d65e07e6f1ea4ad0d7935f9e93a5ef1a6d2d9
-
Filesize
2.0MB
MD506fc08f4f00dc5e98e498e3e99859a77
SHA16177caa516a7aa72746bb4607364acfc572174cf
SHA2566dd5cba03075fdb4c555e718c2d80877aed428836dda6ba9d05af4dee7a76d56
SHA51213f744fdf416c95e367d6088e21dc08be2d54e13dbf48bcfba5defc2e22fcf63bc558bf2a44c10016cda787eb1ab7379b1a862b18e6221879be64cef80f25865
-
Filesize
2.0MB
MD506fc08f4f00dc5e98e498e3e99859a77
SHA16177caa516a7aa72746bb4607364acfc572174cf
SHA2566dd5cba03075fdb4c555e718c2d80877aed428836dda6ba9d05af4dee7a76d56
SHA51213f744fdf416c95e367d6088e21dc08be2d54e13dbf48bcfba5defc2e22fcf63bc558bf2a44c10016cda787eb1ab7379b1a862b18e6221879be64cef80f25865
-
Filesize
2.0MB
MD506fc08f4f00dc5e98e498e3e99859a77
SHA16177caa516a7aa72746bb4607364acfc572174cf
SHA2566dd5cba03075fdb4c555e718c2d80877aed428836dda6ba9d05af4dee7a76d56
SHA51213f744fdf416c95e367d6088e21dc08be2d54e13dbf48bcfba5defc2e22fcf63bc558bf2a44c10016cda787eb1ab7379b1a862b18e6221879be64cef80f25865