Analysis
-
max time kernel
205s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 05:30
Static task
static1
Behavioral task
behavioral1
Sample
788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe
Resource
win10v2004-20220901-en
General
-
Target
788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe
-
Size
337KB
-
MD5
401697d85d611e98ecbb27bb03885886
-
SHA1
696fad02436cb152910d2b7f6666f89ef7f2a87b
-
SHA256
788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828
-
SHA512
df7a27bdd8d06c5d099c84e2ceec459941d6abab5b2af5f0042cf8f9e56b2edb110bcb24acfd6192559b3180561396384288bbb875bccd8efb24f58b04749c03
-
SSDEEP
6144:t2Mtw0qGZp8toFUUcYHutlbly4MfJYQOnizjVsoI5E1+JIqHneEFY:ti0vfWVY0Zy1JYQ1+VHo
Malware Config
Extracted
cybergate
v1.07.5
faceboooook
peruxd.no-ip.biz:81
158BP3S2YUSS7G
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
systeminfo1.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\systeminfo1.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\install\\systeminfo1.exe" systeminfo1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\systeminfo1.exe" 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\install\\systeminfo1.exe" systeminfo1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run systeminfo1.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\install\\systeminfo1.exe" systeminfo1.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run systeminfo1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\systeminfo1.exe" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\systeminfo1.exe" 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\install\\systeminfo1.exe" systeminfo1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run systeminfo1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run systeminfo1.exe -
Executes dropped EXE 10 IoCs
pid Process 1144 systeminfo1.exe 1708 systeminfo1.exe 1984 systeminfo1.exe 1748 systeminfo1.exe 856 systeminfo1.exe 1200 systeminfo1.exe 1768 systeminfo1.exe 1516 systeminfo1.exe 1048 systeminfo1.exe 1772 systeminfo1.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{V7531651-31TJ-YN5E-LONN-F1CDM86100PW}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\install\\systeminfo1.exe Restart" systeminfo1.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{V7531651-31TJ-YN5E-LONN-F1CDM86100PW} 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{V7531651-31TJ-YN5E-LONN-F1CDM86100PW}\StubPath = "C:\\Windows\\system32\\install\\systeminfo1.exe Restart" 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{V7531651-31TJ-YN5E-LONN-F1CDM86100PW} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{V7531651-31TJ-YN5E-LONN-F1CDM86100PW}\StubPath = "C:\\Windows\\system32\\install\\systeminfo1.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{V7531651-31TJ-YN5E-LONN-F1CDM86100PW} systeminfo1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{V7531651-31TJ-YN5E-LONN-F1CDM86100PW}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\install\\systeminfo1.exe Restart" systeminfo1.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{V7531651-31TJ-YN5E-LONN-F1CDM86100PW} systeminfo1.exe -
resource yara_rule behavioral1/memory/1700-63-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/1700-72-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1164-77-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1164-80-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1700-82-0x00000000104F0000-0x0000000010555000-memory.dmp upx behavioral1/memory/1700-111-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/828-118-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/828-121-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/1708-137-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/856-143-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1748-167-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1048-173-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1048-175-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/828-184-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/856-186-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Loads dropped DLL 8 IoCs
pid Process 1164 explorer.exe 1164 explorer.exe 1164 explorer.exe 1164 explorer.exe 1164 explorer.exe 1164 explorer.exe 828 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 828 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\systeminfo1.exe" 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\systeminfo1.exe" 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run systeminfo1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\install\\systeminfo1.exe" systeminfo1.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run systeminfo1.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run systeminfo1.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\install\\systeminfo1.exe" systeminfo1.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\systeminfo1.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\install\\systeminfo1.exe" systeminfo1.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\systeminfo1.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run systeminfo1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\install\\systeminfo1.exe" systeminfo1.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\install\systeminfo1.exe systeminfo1.exe File created C:\Windows\SysWOW64\install\systeminfo1.exe systeminfo1.exe File opened for modification C:\Windows\SysWOW64\install\systeminfo1.exe systeminfo1.exe File opened for modification C:\Windows\SysWOW64\install\systeminfo1.exe systeminfo1.exe File created C:\Windows\SysWOW64\install\systeminfo1.exe systeminfo1.exe File opened for modification C:\Windows\SysWOW64\install\systeminfo1.exe systeminfo1.exe File created C:\Windows\SysWOW64\install\systeminfo1.exe 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe File opened for modification C:\Windows\SysWOW64\install\systeminfo1.exe 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe File opened for modification C:\Windows\SysWOW64\install\systeminfo1.exe systeminfo1.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 944 set thread context of 1700 944 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 28 PID 1144 set thread context of 1708 1144 systeminfo1.exe 33 PID 1984 set thread context of 1748 1984 systeminfo1.exe 35 PID 1200 set thread context of 1768 1200 systeminfo1.exe 39 PID 1516 set thread context of 1772 1516 systeminfo1.exe 43 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 828 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeBackupPrivilege 1164 explorer.exe Token: SeRestorePrivilege 1164 explorer.exe Token: SeBackupPrivilege 828 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe Token: SeRestorePrivilege 828 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe Token: SeDebugPrivilege 828 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe Token: SeDebugPrivilege 828 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe Token: SeBackupPrivilege 856 systeminfo1.exe Token: SeRestorePrivilege 856 systeminfo1.exe Token: SeBackupPrivilege 1048 systeminfo1.exe Token: SeRestorePrivilege 1048 systeminfo1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 944 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 1144 systeminfo1.exe 1984 systeminfo1.exe 1200 systeminfo1.exe 1516 systeminfo1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 944 wrote to memory of 1700 944 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 28 PID 944 wrote to memory of 1700 944 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 28 PID 944 wrote to memory of 1700 944 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 28 PID 944 wrote to memory of 1700 944 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 28 PID 944 wrote to memory of 1700 944 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 28 PID 944 wrote to memory of 1700 944 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 28 PID 944 wrote to memory of 1700 944 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 28 PID 944 wrote to memory of 1700 944 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 28 PID 944 wrote to memory of 1700 944 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 28 PID 944 wrote to memory of 1700 944 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 28 PID 944 wrote to memory of 1700 944 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 28 PID 944 wrote to memory of 1700 944 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 28 PID 944 wrote to memory of 1700 944 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 28 PID 944 wrote to memory of 1700 944 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 28 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16 PID 1700 wrote to memory of 1284 1700 788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe 16
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe"C:\Users\Admin\AppData\Local\Temp\788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exeC:\Users\Admin\AppData\Local\Temp\788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1164 -
C:\Windows\SysWOW64\install\systeminfo1.exe"C:\Windows\system32\install\systeminfo1.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1144 -
C:\Windows\SysWOW64\install\systeminfo1.exeC:\Windows\SysWOW64\install\systeminfo1.exe6⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
PID:1708 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1396
-
-
C:\Windows\SysWOW64\install\systeminfo1.exe"C:\Windows\SysWOW64\install\systeminfo1.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
-
-
C:\Windows\SysWOW64\install\systeminfo1.exe"C:\Windows\system32\install\systeminfo1.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1984 -
C:\Windows\SysWOW64\install\systeminfo1.exeC:\Windows\SysWOW64\install\systeminfo1.exe6⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
PID:1748 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:916
-
-
C:\Windows\SysWOW64\install\systeminfo1.exe"C:\Windows\SysWOW64\install\systeminfo1.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
-
-
-
C:\Windows\SysWOW64\install\systeminfo1.exe"C:\Windows\system32\install\systeminfo1.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1200 -
C:\Windows\SysWOW64\install\systeminfo1.exeC:\Windows\SysWOW64\install\systeminfo1.exe6⤵
- Executes dropped EXE
PID:1768
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1444
-
-
C:\Users\Admin\AppData\Local\Temp\788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe"C:\Users\Admin\AppData\Local\Temp\788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828.exe"4⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:828 -
C:\Users\Admin\AppData\Roaming\install\systeminfo1.exe"C:\Users\Admin\AppData\Roaming\install\systeminfo1.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1516 -
C:\Users\Admin\AppData\Roaming\install\systeminfo1.exeC:\Users\Admin\AppData\Roaming\install\systeminfo1.exe6⤵
- Executes dropped EXE
PID:1772
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5d9218c4fcb5636420b6bc2d2e54c9af5
SHA135aec78bdeb0f06123795ac001bf4de8f03e0bbb
SHA256694d9c0ab555c9a8a519661ba1773d701c8b50f0a74341c438ee9ed51055cc85
SHA51226cfec3a360d13fe66f3c702e7f1935691b55fe592ea3edc4086b27ca9adf038cfba79085bdeda1b6b8456e64c2350213ea5d93f43aed8f5035120054d5e6d09
-
Filesize
224KB
MD5d9218c4fcb5636420b6bc2d2e54c9af5
SHA135aec78bdeb0f06123795ac001bf4de8f03e0bbb
SHA256694d9c0ab555c9a8a519661ba1773d701c8b50f0a74341c438ee9ed51055cc85
SHA51226cfec3a360d13fe66f3c702e7f1935691b55fe592ea3edc4086b27ca9adf038cfba79085bdeda1b6b8456e64c2350213ea5d93f43aed8f5035120054d5e6d09
-
Filesize
224KB
MD59803e8d434aca055e46f9e613444c5ac
SHA10b631e99451920182e477f2315cedf742b2c14b8
SHA256fd5d40aa941fa292dc836b23bf0abfb615efb4282f6d932948028f92626867fc
SHA512621cffa5969296dbf234dbe94f667568cf1389aeb5d92bf3fd85a54e78286cbce390f54d982e4cbb4244d9ac9c2cd636b1679c3e707178b5809d157081c981bc
-
Filesize
337KB
MD5401697d85d611e98ecbb27bb03885886
SHA1696fad02436cb152910d2b7f6666f89ef7f2a87b
SHA256788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828
SHA512df7a27bdd8d06c5d099c84e2ceec459941d6abab5b2af5f0042cf8f9e56b2edb110bcb24acfd6192559b3180561396384288bbb875bccd8efb24f58b04749c03
-
Filesize
337KB
MD5401697d85d611e98ecbb27bb03885886
SHA1696fad02436cb152910d2b7f6666f89ef7f2a87b
SHA256788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828
SHA512df7a27bdd8d06c5d099c84e2ceec459941d6abab5b2af5f0042cf8f9e56b2edb110bcb24acfd6192559b3180561396384288bbb875bccd8efb24f58b04749c03
-
Filesize
337KB
MD5401697d85d611e98ecbb27bb03885886
SHA1696fad02436cb152910d2b7f6666f89ef7f2a87b
SHA256788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828
SHA512df7a27bdd8d06c5d099c84e2ceec459941d6abab5b2af5f0042cf8f9e56b2edb110bcb24acfd6192559b3180561396384288bbb875bccd8efb24f58b04749c03
-
Filesize
337KB
MD5401697d85d611e98ecbb27bb03885886
SHA1696fad02436cb152910d2b7f6666f89ef7f2a87b
SHA256788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828
SHA512df7a27bdd8d06c5d099c84e2ceec459941d6abab5b2af5f0042cf8f9e56b2edb110bcb24acfd6192559b3180561396384288bbb875bccd8efb24f58b04749c03
-
Filesize
337KB
MD5401697d85d611e98ecbb27bb03885886
SHA1696fad02436cb152910d2b7f6666f89ef7f2a87b
SHA256788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828
SHA512df7a27bdd8d06c5d099c84e2ceec459941d6abab5b2af5f0042cf8f9e56b2edb110bcb24acfd6192559b3180561396384288bbb875bccd8efb24f58b04749c03
-
Filesize
337KB
MD5401697d85d611e98ecbb27bb03885886
SHA1696fad02436cb152910d2b7f6666f89ef7f2a87b
SHA256788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828
SHA512df7a27bdd8d06c5d099c84e2ceec459941d6abab5b2af5f0042cf8f9e56b2edb110bcb24acfd6192559b3180561396384288bbb875bccd8efb24f58b04749c03
-
Filesize
337KB
MD5401697d85d611e98ecbb27bb03885886
SHA1696fad02436cb152910d2b7f6666f89ef7f2a87b
SHA256788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828
SHA512df7a27bdd8d06c5d099c84e2ceec459941d6abab5b2af5f0042cf8f9e56b2edb110bcb24acfd6192559b3180561396384288bbb875bccd8efb24f58b04749c03
-
Filesize
337KB
MD5401697d85d611e98ecbb27bb03885886
SHA1696fad02436cb152910d2b7f6666f89ef7f2a87b
SHA256788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828
SHA512df7a27bdd8d06c5d099c84e2ceec459941d6abab5b2af5f0042cf8f9e56b2edb110bcb24acfd6192559b3180561396384288bbb875bccd8efb24f58b04749c03
-
Filesize
337KB
MD5401697d85d611e98ecbb27bb03885886
SHA1696fad02436cb152910d2b7f6666f89ef7f2a87b
SHA256788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828
SHA512df7a27bdd8d06c5d099c84e2ceec459941d6abab5b2af5f0042cf8f9e56b2edb110bcb24acfd6192559b3180561396384288bbb875bccd8efb24f58b04749c03
-
Filesize
337KB
MD5401697d85d611e98ecbb27bb03885886
SHA1696fad02436cb152910d2b7f6666f89ef7f2a87b
SHA256788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828
SHA512df7a27bdd8d06c5d099c84e2ceec459941d6abab5b2af5f0042cf8f9e56b2edb110bcb24acfd6192559b3180561396384288bbb875bccd8efb24f58b04749c03
-
Filesize
337KB
MD5401697d85d611e98ecbb27bb03885886
SHA1696fad02436cb152910d2b7f6666f89ef7f2a87b
SHA256788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828
SHA512df7a27bdd8d06c5d099c84e2ceec459941d6abab5b2af5f0042cf8f9e56b2edb110bcb24acfd6192559b3180561396384288bbb875bccd8efb24f58b04749c03
-
Filesize
337KB
MD5401697d85d611e98ecbb27bb03885886
SHA1696fad02436cb152910d2b7f6666f89ef7f2a87b
SHA256788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828
SHA512df7a27bdd8d06c5d099c84e2ceec459941d6abab5b2af5f0042cf8f9e56b2edb110bcb24acfd6192559b3180561396384288bbb875bccd8efb24f58b04749c03
-
Filesize
337KB
MD5401697d85d611e98ecbb27bb03885886
SHA1696fad02436cb152910d2b7f6666f89ef7f2a87b
SHA256788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828
SHA512df7a27bdd8d06c5d099c84e2ceec459941d6abab5b2af5f0042cf8f9e56b2edb110bcb24acfd6192559b3180561396384288bbb875bccd8efb24f58b04749c03
-
Filesize
337KB
MD5401697d85d611e98ecbb27bb03885886
SHA1696fad02436cb152910d2b7f6666f89ef7f2a87b
SHA256788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828
SHA512df7a27bdd8d06c5d099c84e2ceec459941d6abab5b2af5f0042cf8f9e56b2edb110bcb24acfd6192559b3180561396384288bbb875bccd8efb24f58b04749c03
-
Filesize
337KB
MD5401697d85d611e98ecbb27bb03885886
SHA1696fad02436cb152910d2b7f6666f89ef7f2a87b
SHA256788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828
SHA512df7a27bdd8d06c5d099c84e2ceec459941d6abab5b2af5f0042cf8f9e56b2edb110bcb24acfd6192559b3180561396384288bbb875bccd8efb24f58b04749c03
-
Filesize
337KB
MD5401697d85d611e98ecbb27bb03885886
SHA1696fad02436cb152910d2b7f6666f89ef7f2a87b
SHA256788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828
SHA512df7a27bdd8d06c5d099c84e2ceec459941d6abab5b2af5f0042cf8f9e56b2edb110bcb24acfd6192559b3180561396384288bbb875bccd8efb24f58b04749c03
-
Filesize
337KB
MD5401697d85d611e98ecbb27bb03885886
SHA1696fad02436cb152910d2b7f6666f89ef7f2a87b
SHA256788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828
SHA512df7a27bdd8d06c5d099c84e2ceec459941d6abab5b2af5f0042cf8f9e56b2edb110bcb24acfd6192559b3180561396384288bbb875bccd8efb24f58b04749c03
-
Filesize
337KB
MD5401697d85d611e98ecbb27bb03885886
SHA1696fad02436cb152910d2b7f6666f89ef7f2a87b
SHA256788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828
SHA512df7a27bdd8d06c5d099c84e2ceec459941d6abab5b2af5f0042cf8f9e56b2edb110bcb24acfd6192559b3180561396384288bbb875bccd8efb24f58b04749c03
-
Filesize
337KB
MD5401697d85d611e98ecbb27bb03885886
SHA1696fad02436cb152910d2b7f6666f89ef7f2a87b
SHA256788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828
SHA512df7a27bdd8d06c5d099c84e2ceec459941d6abab5b2af5f0042cf8f9e56b2edb110bcb24acfd6192559b3180561396384288bbb875bccd8efb24f58b04749c03
-
Filesize
337KB
MD5401697d85d611e98ecbb27bb03885886
SHA1696fad02436cb152910d2b7f6666f89ef7f2a87b
SHA256788439754ab88b12cfd27aab8974f83d676b4b30ceaa5fd072aa331319ff2828
SHA512df7a27bdd8d06c5d099c84e2ceec459941d6abab5b2af5f0042cf8f9e56b2edb110bcb24acfd6192559b3180561396384288bbb875bccd8efb24f58b04749c03