Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 02:56
Behavioral task
behavioral1
Sample
90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe
Resource
win10v2004-20220812-en
General
-
Target
90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe
-
Size
137KB
-
MD5
13ad7a2ea9b4364b1c1d68033bae3b5e
-
SHA1
7e6b9d51941bb24dd3104d13d852dc068b5be848
-
SHA256
90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b
-
SHA512
8ff13ab209ab3956e71dd485c04ec9a36375f5a1c803a004b0f9ebb2d2014bb55b444af07429a6381b2a21689cb022410bbab5bffacb3c5454ac6e0d8870bd10
-
SSDEEP
3072:sr85CQPowYJE+OjioVknZE8/HK52+f9W9TPyYPowYJE+OjioVknZE8/HK5W:k9idioV0r/WR9t6dioV0r/WW
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Drops file in Drivers directory 1 IoCs
Processes:
90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe -
Executes dropped EXE 1 IoCs
Processes:
90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exepid process 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exedescription ioc process File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MI9C33~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~3.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MI391D~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MIA062~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~2.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~4.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe -
Drops file in Windows directory 1 IoCs
Processes:
90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exedescription ioc process File opened for modification C:\Windows\svchost.com 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1276 1660 WerFault.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 3600 ipconfig.exe -
Modifies registry class 1 IoCs
Processes:
90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exepid process 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exedescription pid process Token: SeDebugPrivilege 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.execmd.exedescription pid process target process PID 852 wrote to memory of 1660 852 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe PID 852 wrote to memory of 1660 852 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe PID 852 wrote to memory of 1660 852 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe PID 1660 wrote to memory of 4220 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe cmd.exe PID 1660 wrote to memory of 4220 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe cmd.exe PID 1660 wrote to memory of 4220 1660 90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe cmd.exe PID 4220 wrote to memory of 3600 4220 cmd.exe ipconfig.exe PID 4220 wrote to memory of 3600 4220 cmd.exe ipconfig.exe PID 4220 wrote to memory of 3600 4220 cmd.exe ipconfig.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe"C:\Users\Admin\AppData\Local\Temp\90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe"1⤵
- Modifies system executable filetype association
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3582-490\DNS.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdnsipconfig/releaseipconfig/renew4⤵
- Gathers network information
PID:3600
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 13403⤵
- Program crash
PID:1276
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1660 -ip 16601⤵PID:748
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3582-490\90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe
Filesize96KB
MD5eb9e93957687314c8beb7f653d971286
SHA1fd9bc5ed8f90d66a58d7d46185ba8b037d8c5558
SHA25606fe78ca204b9b9027af20f5456d0cfec8e654375ee23030203948075315b6c9
SHA51211b213570151b42f0a1ecad24a7d35a33085707e03375075eec7c93f5acbf88beaf5cd8ffa65f0e3e2e788cc74ceef9e69e7955f04672c2f82d0292dfa14fee9
-
C:\Users\Admin\AppData\Local\Temp\3582-490\90ccc954f4224b2160f2a626ea28c5aa524a2e8dc5c8c0f47d67776fb9ee4d1b.exe
Filesize96KB
MD5eb9e93957687314c8beb7f653d971286
SHA1fd9bc5ed8f90d66a58d7d46185ba8b037d8c5558
SHA25606fe78ca204b9b9027af20f5456d0cfec8e654375ee23030203948075315b6c9
SHA51211b213570151b42f0a1ecad24a7d35a33085707e03375075eec7c93f5acbf88beaf5cd8ffa65f0e3e2e788cc74ceef9e69e7955f04672c2f82d0292dfa14fee9
-
Filesize
47B
MD54b403bd7ff6fe021fcf3ecdd2c029f87
SHA1890642fc02dbfffd5d3aef0ec652fa636a48c3ee
SHA256267c9197388ab6b34c7516e728a3529df2b7aab5029588ffb47540bbe651f654
SHA5123bdef29cfeab451d45182420bd179f9450a0da5c842992260a420728e212635f90cc1f394687c8ac852ccd8caf529e9bdb4aff24e2d07f6705594931b3ef5e6d