Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:28
Static task
static1
Behavioral task
behavioral1
Sample
c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe
Resource
win10v2004-20220901-en
General
-
Target
c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe
-
Size
3.2MB
-
MD5
60d87145479d73dae26ffdce16c1a071
-
SHA1
0206ace501f3760edf5be079951fcadd17c52c7b
-
SHA256
c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63
-
SHA512
cb90cc27e5f53e2b00e187d203191ef76e432592a5de1c2ca820b920c90e4b9999925da0ac25ed0890e360e7f3baa694003ffa811b45cdf96d74cb4833e57195
-
SSDEEP
98304:xFNW00i+rCrOZk8mXENd5VY8ScDnOsahMtAnZ:x9Tg4OZkdXEv0wODhMM
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Windows Up.EXEWindows Up.EXEpid process 4376 Windows Up.EXE 4988 Windows Up.EXE -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exeWindows Up.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Windows Up.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Windows Up.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Windows Up.EXEdescription ioc process Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\currentversion\run\ Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update = "c:\\Program Files\\Javascript\\Windows Up.EXE" Windows Up.EXE -
Drops file in Program Files directory 4 IoCs
Processes:
c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exeWindows Up.EXEdescription ioc process File created \??\c:\Program Files\Javascript\win_pdf.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe File created \??\c:\Program Files\Javascript\Windows Up.EXE c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe File opened for modification \??\c:\Program Files\Javascript\lgfiles Windows Up.EXE File opened for modification \??\c:\Program Files\Javascript\Windows Up.EXE Windows Up.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 49 IoCs
Processes:
c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exeWindows Up.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\LocalServer32 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\LocalServer32\ = "%systemroot%\\SysWow64\\WinrsHost.exe" c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cPnnsvhcQZmzE\ = "pXMblZ~^aTCqd{XBjw}Jx" Windows Up.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\BXxgd Windows Up.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\zpwmZURsn Windows Up.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\aBzpJhl Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\qhnfhsx\ = "\\" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\fxhrcUnllGp\ = "\\Yb{nAv{STJ\\AUlIBvMbml]NaWehuz" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\aBzpJhl\ = "g{RVt]iRX`HfIg`_NGfNSm" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\aBzpJhl\ = "g{RVt]iRX`H`Ig`_NAZv}l" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\qhnfhsx\ = "X" Windows Up.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\knffWnJfec Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\fxhrcUnllGp\ = "\\Yb{nAv{STJ\\AUlIBvMbmh}NaWehuz" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\qhnfhsx\ = "h" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\fxhrcUnllGp\ = "\\Yb{nAv{STJ\\AUlIBvMbm`}NaWehuz" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\aBzpJhl\ = "g{RVt]iRX`HeIg`_NJG\\Tj" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\fxhrcUnllGp\ = "\\Yb{nAv{STJ\\AUlIBvMbmL}NaWehuz" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\aBzpJhl\ = "g{RVt]iRX`HaIg`_NK{gTj" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\BXxgd\ = "H[bKBQeTvYoy^}iUBD}ztri\x7f" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\zpwmZURsn\ = "mXj|\\Ig\x7fNDwVwPJ@LdNet|oWc_FjC" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\fxhrcUnllGp\ = "\\Yb{nAF{STJ\\AU\\IBvMbmnmNaWehuz" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\aBzpJhl\ = "g{RVt]iRX`HbIg`_N@q\\Sg" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\qhnfhsx\ = "p" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ = "Microsoft Windows Remote Shell Host" c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\AppId = "{3e5ca495-8d6a-4d1f-ad99-177b426c8b8e}" c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\fxhrcUnllGp Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\knffWnJfec\ = "DiR_mFU_FMlfgXi@iTMWm" Windows Up.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\dlRaAkwsskRM Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\aBzpJhl\ = "g{RVt]iRX`HjIg`_NMwi^Z" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\qhnfhsx\ = "d" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\aBzpJhl\ = "g{RVt]iRX`HkIg`_NARlmA" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\qhnfhsx\ = "D" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\qhnfhsx\ = "|" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\fxhrcUnllGp\ = "\\Yb{nAv{STJ\\AUlIBvMbmx}NaWehuz" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\fxhrcUnllGp\ = "\\Yb{nAv{STJ\\AUlIBvMbmt}NaWehuz" Windows Up.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA} c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cPnnsvhcQZmzE Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\dlRaAkwsskRM\ = "vH|Gj^m]wHZTMHXvwK{oCue" Windows Up.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\qhnfhsx Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\qhnfhsx\ = "l" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\fxhrcUnllGp\ = "\\Yb{nAv{STJ\\AUlIBvMbm|}NaWehuz" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\fxhrcUnllGp\ = "\\Yb{nAv{STJ\\AUlIBvMbmnmNaWehuz" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\fxhrcUnllGp\ = "\\Yb{nAv{STJ\\AUlIBvMbmd}NaWehuz" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\aBzpJhl\ = "g{RVt]iRX`HgIg`_N@yBZd" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\LocalServer32\ServerExecutable = "%systemroot%\\SysWow64\\WinrsHost.exe" c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\aBzpJhl\ = "g{RVt]iRX`HiIg`_NFiml~" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\aBzpJhl\ = "g{RVt]iRX`HdIg`_NFMd}f" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\aBzpJhl\ = "g{RVt]iRX`HcIg`_NGnPZn" Windows Up.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\fxhrcUnllGp\ = "\\Yb{nAv{STJ\\AUlIBvMbmp}NaWehuz" Windows Up.EXE -
NTFS ADS 2 IoCs
Processes:
Windows Up.EXEdescription ioc process File created C:\ProgramData\TEMP:C980DA7D Windows Up.EXE File opened for modification C:\ProgramData\TEMP:C980DA7D Windows Up.EXE -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exeWindows Up.EXEdescription pid process Token: 33 3012 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Token: SeIncBasePriorityPrivilege 3012 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Token: 33 3012 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Token: SeIncBasePriorityPrivilege 3012 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe Token: 33 4988 Windows Up.EXE Token: SeIncBasePriorityPrivilege 4988 Windows Up.EXE Token: 33 4988 Windows Up.EXE Token: SeIncBasePriorityPrivilege 4988 Windows Up.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Windows Up.EXEpid process 4988 Windows Up.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exedescription pid process target process PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe PID 400 wrote to memory of 3012 400 c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe"C:\Users\Admin\AppData\Local\Temp\c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe"C:\Users\Admin\AppData\Local\Temp\c219955852517964f6b6e795a52b1d0c425bd30ada4f061afe21f3d535642c63.exe"2⤵
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3012 -
\??\c:\Program Files\Javascript\Windows Up.EXE"c:\Program Files\Javascript\Windows Up.EXE"3⤵
- Executes dropped EXE
PID:4376 -
\??\c:\Program Files\Javascript\Windows Up.EXE"c:\Program Files\Javascript\Windows Up.EXE"4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4988
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD506fc08f4f00dc5e98e498e3e99859a77
SHA16177caa516a7aa72746bb4607364acfc572174cf
SHA2566dd5cba03075fdb4c555e718c2d80877aed428836dda6ba9d05af4dee7a76d56
SHA51213f744fdf416c95e367d6088e21dc08be2d54e13dbf48bcfba5defc2e22fcf63bc558bf2a44c10016cda787eb1ab7379b1a862b18e6221879be64cef80f25865
-
Filesize
2.0MB
MD506fc08f4f00dc5e98e498e3e99859a77
SHA16177caa516a7aa72746bb4607364acfc572174cf
SHA2566dd5cba03075fdb4c555e718c2d80877aed428836dda6ba9d05af4dee7a76d56
SHA51213f744fdf416c95e367d6088e21dc08be2d54e13dbf48bcfba5defc2e22fcf63bc558bf2a44c10016cda787eb1ab7379b1a862b18e6221879be64cef80f25865
-
Filesize
127B
MD5397ee39af9289f07f4b81b3c722008e6
SHA10e6e49239a9cd65e6ef848ecace7ce09b5c638d8
SHA256cb137ce7d0b2b6934b8f1094f6ada5123adcdcfa17bd8efa561bfb2f86e4b29c
SHA51294128a9b04750e9bed30ce94f793d0b71f6561d296303bd1c948de3389651b99ca83deb29ff44c9adfe0594f0d80f36f75088a6ecb2824f6c01ad05db642f639
-
Filesize
125B
MD5a7af2e45edc5b3684cac3e493c017ff3
SHA1f4ab1c4632f4161f825bd66ba8bb28be7589f0cc
SHA256c9449eaea86aa3bf9a4f75bc913b26b0b001ca62086ef9141a2f03bf6b82d9f7
SHA512bda826a7eef79339e89d4d7e1ee178aa5484e58b50644f6c8a907a0a4420b45d35bd382de7cef6edc5748b672b87b2240bce70eddc4aaa3c52df4bb843d4ecaf
-
Filesize
127B
MD51a94305d7378b7ddc1cf17096c418045
SHA10c5a33e69061f3985a3200523922199845ee035e
SHA256f1c1e47a939b121bbd61791580483335340bbdead4912c291b1abfa3d3f97ba1
SHA5125f65c3d364c8336b67fa09c46686d81d181d2854664bdcdd4e33f8a5f49d5d2f7a31c516297ddb42bb6d36cfde6772aa5eb0a7a02c1c36659fa0719bdbc98536
-
Filesize
127B
MD5f20f9bc3348798fe97949dcbe869b20e
SHA1ddc404bb1b2259ad7abfe6330edd5c485ba53170
SHA256bd0d781946d7cdf1b1183c1d54d39d63887b3345f19ca96103260456483c2c6b
SHA5123918b14bcb7f92b17904cbe036a786007388841e05e850313082c9775a4e0df0c4b7a8284ca2fd26419dd807b102edd3ed3e0b99f0a2d4879070fe06eba804ba
-
Filesize
2.0MB
MD506fc08f4f00dc5e98e498e3e99859a77
SHA16177caa516a7aa72746bb4607364acfc572174cf
SHA2566dd5cba03075fdb4c555e718c2d80877aed428836dda6ba9d05af4dee7a76d56
SHA51213f744fdf416c95e367d6088e21dc08be2d54e13dbf48bcfba5defc2e22fcf63bc558bf2a44c10016cda787eb1ab7379b1a862b18e6221879be64cef80f25865