Analysis
-
max time kernel
204s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 00:54
Behavioral task
behavioral1
Sample
f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5.exe
Resource
win10v2004-20221111-en
General
-
Target
f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5.exe
-
Size
279KB
-
MD5
92ab15acb2bbdf3e41148be3ed0bbdf8
-
SHA1
f503b9863b628995c3308124a9f2cdd855de01df
-
SHA256
f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5
-
SHA512
498ef5d71fb0d09e979854e27fb7c07c6e625e8225e6608b48ccbba46e733ebb18b7292981e438fdd207b256fcc748a75290035f23a119e2100096a58160b204
-
SSDEEP
6144:alZ/zUMu4pDSxsCMRzf7x3SfS1JAzXBtL76lJe:aHLUMuiv9RgfSjAzRtyY
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\fdisk.com" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\SysWOW64\\userinit.exe,C:\\Windows\\SysWOW64\\fdisk.com" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\SysWOW64\\userinit.exe,C:\\Windows\\SysWOW64\\fdisk.com" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\fdisk.com" svchost.com -
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "2" svchost.com Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "2" svchost.com -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.com Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.com -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" svchost.com Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" svchost.com -
Disables Task Manager via registry modification
-
Executes dropped EXE 4 IoCs
pid Process 1632 svchost.com 2540 cftmon.exe 3772 svchost.com 3388 cftmon.exe -
Sets file execution options in registry 2 TTPs 44 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\USBGUARD.EXE svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsgui.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashdisp.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctstray.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\USBGUARD.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGNT.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashdisp.exe svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\USBGUARD.EXE svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsgui.exe svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsgui.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctstray.exe svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\USBGUARD.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGNT.EXE svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGNT.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctstray.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsgui.exe svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashdisp.exe svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashdisp.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGNT.EXE svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctstray.exe svchost.com -
resource yara_rule behavioral2/memory/4160-133-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/files/0x0007000000022658-135.dat upx behavioral2/files/0x0007000000022658-136.dat upx behavioral2/memory/4160-137-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/1632-138-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/files/0x00060000000231a3-140.dat upx behavioral2/files/0x00060000000231a3-141.dat upx behavioral2/files/0x0007000000022658-143.dat upx behavioral2/files/0x00060000000231be-144.dat upx behavioral2/files/0x000600000002319a-145.dat upx behavioral2/memory/2540-146-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/3772-147-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/files/0x00060000000231a3-150.dat upx behavioral2/memory/3388-151-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/1632-152-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/2540-153-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/memory/3772-154-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral2/files/0x000600000002319f-148.dat upx behavioral2/files/0x00060000000231a1-155.dat upx behavioral2/files/0x00060000000231a2-156.dat upx -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation cftmon.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sndvol32.exe svchost.com File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sndvol32.exe svchost.com -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HotKey = "C:\\Users\\Admin\\Templates\\cache\\SFCsrvc.pif" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\User Agent = "C:\\Windows\\SysWOW64\\fdisk.com" svchost.com Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\User Agent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HotKey = "C:\\Users\\Admin\\Templates\\cache\\SFCsrvc.pif" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\User Agent = "C:\\Windows\\SysWOW64\\fdisk.com" svchost.com Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HotKey = "C:\\Users\\Admin\\Templates\\cache\\SFCsrvc.pif" svchost.com Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.com Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HotKey = "C:\\Users\\Admin\\Templates\\cache\\SFCsrvc.pif" svchost.com Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\User Agent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run svchost.com -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification \??\c:\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\desktop.ini svchost.com File opened for modification C:\Users\Admin\AppData\Local\Temp\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\desktop.ini f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5.exe File opened for modification C:\Users\Admin\Templates\cache\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\desktop.ini svchost.com File opened for modification C:\Users\Admin\Templates\cache\desktop.ini svchost.com -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\l: svchost.com File opened (read-only) \??\o: svchost.com File opened (read-only) \??\s: svchost.com File opened (read-only) \??\z: svchost.com File opened (read-only) \??\q: svchost.com File opened (read-only) \??\r: svchost.com File opened (read-only) \??\v: svchost.com File opened (read-only) \??\k: svchost.com File opened (read-only) \??\e: svchost.com File opened (read-only) \??\f: svchost.com File opened (read-only) \??\h: svchost.com File opened (read-only) \??\v: svchost.com File opened (read-only) \??\t: svchost.com File opened (read-only) \??\g: svchost.com File opened (read-only) \??\j: svchost.com File opened (read-only) \??\m: svchost.com File opened (read-only) \??\g: svchost.com File opened (read-only) \??\o: svchost.com File opened (read-only) \??\p: svchost.com File opened (read-only) \??\s: svchost.com File opened (read-only) \??\q: svchost.com File opened (read-only) \??\w: svchost.com File opened (read-only) \??\x: svchost.com File opened (read-only) \??\z: svchost.com File opened (read-only) \??\n: svchost.com File opened (read-only) \??\y: svchost.com File opened (read-only) \??\b: svchost.com File opened (read-only) \??\m: svchost.com File opened (read-only) \??\w: svchost.com File opened (read-only) \??\y: svchost.com File opened (read-only) \??\j: svchost.com File opened (read-only) \??\n: svchost.com File opened (read-only) \??\b: svchost.com File opened (read-only) \??\a: svchost.com File opened (read-only) \??\i: svchost.com File opened (read-only) \??\a: svchost.com File opened (read-only) \??\i: svchost.com File opened (read-only) \??\k: svchost.com File opened (read-only) \??\u: svchost.com File opened (read-only) \??\h: svchost.com File opened (read-only) \??\p: svchost.com File opened (read-only) \??\r: svchost.com File opened (read-only) \??\t: svchost.com File opened (read-only) \??\l: svchost.com File opened (read-only) \??\x: svchost.com File opened (read-only) \??\e: svchost.com File opened (read-only) \??\f: svchost.com File opened (read-only) \??\u: svchost.com -
AutoIT Executable 8 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4160-133-0x0000000000400000-0x00000000004AC000-memory.dmp autoit_exe behavioral2/memory/4160-137-0x0000000000400000-0x00000000004AC000-memory.dmp autoit_exe behavioral2/memory/2540-146-0x0000000000400000-0x00000000004AC000-memory.dmp autoit_exe behavioral2/memory/3772-147-0x0000000000400000-0x00000000004AC000-memory.dmp autoit_exe behavioral2/memory/3388-151-0x0000000000400000-0x00000000004AC000-memory.dmp autoit_exe behavioral2/memory/1632-152-0x0000000000400000-0x00000000004AC000-memory.dmp autoit_exe behavioral2/memory/2540-153-0x0000000000400000-0x00000000004AC000-memory.dmp autoit_exe behavioral2/memory/3772-154-0x0000000000400000-0x00000000004AC000-memory.dmp autoit_exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification \??\c:\autorun.inf svchost.com File opened for modification C:\\autorun.inf svchost.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\fdisk.com svchost.com File opened for modification C:\Windows\SysWOW64\fdisk.com svchost.com -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\System\cftmon.exe svchost.com -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Help\cliconf.chm svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ cftmon.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4160 f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5.exe 4160 f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5.exe 1632 svchost.com 1632 svchost.com 1632 svchost.com 1632 svchost.com 1632 svchost.com 1632 svchost.com 1632 svchost.com 1632 svchost.com 1632 svchost.com 1632 svchost.com 1632 svchost.com 1632 svchost.com 1632 svchost.com 1632 svchost.com 1632 svchost.com 1632 svchost.com 1632 svchost.com 1632 svchost.com 1632 svchost.com 1632 svchost.com 1632 svchost.com 1632 svchost.com 1632 svchost.com 1632 svchost.com 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe 3388 cftmon.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4160 wrote to memory of 1632 4160 f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5.exe 85 PID 4160 wrote to memory of 1632 4160 f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5.exe 85 PID 4160 wrote to memory of 1632 4160 f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5.exe 85 PID 1632 wrote to memory of 2540 1632 svchost.com 88 PID 1632 wrote to memory of 2540 1632 svchost.com 88 PID 1632 wrote to memory of 2540 1632 svchost.com 88 PID 1632 wrote to memory of 3772 1632 svchost.com 89 PID 1632 wrote to memory of 3772 1632 svchost.com 89 PID 1632 wrote to memory of 3772 1632 svchost.com 89 PID 2540 wrote to memory of 3388 2540 cftmon.exe 90 PID 2540 wrote to memory of 3388 2540 cftmon.exe 90 PID 2540 wrote to memory of 3388 2540 cftmon.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5.exe"C:\Users\Admin\AppData\Local\Temp\f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\svchost.com"C:\Users\Admin\AppData\Local\Temp\svchost.com"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Common Files\System\cftmon.exe"C:\Program Files (x86)\Common Files\System\cftmon.exe" stay_alive -in3⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Common Files\System\cftmon.exe"C:\Program Files (x86)\Common Files\System\cftmon.exe" stay_alive -r4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.comC:\Users\Admin\AppData\Local\Temp\svchost.com keep_fucking3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Adds Run key to start application
- Enumerates connected drives
PID:3772
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
279KB
MD592ab15acb2bbdf3e41148be3ed0bbdf8
SHA1f503b9863b628995c3308124a9f2cdd855de01df
SHA256f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5
SHA512498ef5d71fb0d09e979854e27fb7c07c6e625e8225e6608b48ccbba46e733ebb18b7292981e438fdd207b256fcc748a75290035f23a119e2100096a58160b204
-
Filesize
279KB
MD592ab15acb2bbdf3e41148be3ed0bbdf8
SHA1f503b9863b628995c3308124a9f2cdd855de01df
SHA256f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5
SHA512498ef5d71fb0d09e979854e27fb7c07c6e625e8225e6608b48ccbba46e733ebb18b7292981e438fdd207b256fcc748a75290035f23a119e2100096a58160b204
-
Filesize
279KB
MD592ab15acb2bbdf3e41148be3ed0bbdf8
SHA1f503b9863b628995c3308124a9f2cdd855de01df
SHA256f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5
SHA512498ef5d71fb0d09e979854e27fb7c07c6e625e8225e6608b48ccbba46e733ebb18b7292981e438fdd207b256fcc748a75290035f23a119e2100096a58160b204
-
Filesize
279KB
MD592ab15acb2bbdf3e41148be3ed0bbdf8
SHA1f503b9863b628995c3308124a9f2cdd855de01df
SHA256f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5
SHA512498ef5d71fb0d09e979854e27fb7c07c6e625e8225e6608b48ccbba46e733ebb18b7292981e438fdd207b256fcc748a75290035f23a119e2100096a58160b204
-
Filesize
279KB
MD592ab15acb2bbdf3e41148be3ed0bbdf8
SHA1f503b9863b628995c3308124a9f2cdd855de01df
SHA256f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5
SHA512498ef5d71fb0d09e979854e27fb7c07c6e625e8225e6608b48ccbba46e733ebb18b7292981e438fdd207b256fcc748a75290035f23a119e2100096a58160b204
-
Filesize
279KB
MD592ab15acb2bbdf3e41148be3ed0bbdf8
SHA1f503b9863b628995c3308124a9f2cdd855de01df
SHA256f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5
SHA512498ef5d71fb0d09e979854e27fb7c07c6e625e8225e6608b48ccbba46e733ebb18b7292981e438fdd207b256fcc748a75290035f23a119e2100096a58160b204
-
Filesize
279KB
MD592ab15acb2bbdf3e41148be3ed0bbdf8
SHA1f503b9863b628995c3308124a9f2cdd855de01df
SHA256f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5
SHA512498ef5d71fb0d09e979854e27fb7c07c6e625e8225e6608b48ccbba46e733ebb18b7292981e438fdd207b256fcc748a75290035f23a119e2100096a58160b204
-
Filesize
279KB
MD592ab15acb2bbdf3e41148be3ed0bbdf8
SHA1f503b9863b628995c3308124a9f2cdd855de01df
SHA256f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5
SHA512498ef5d71fb0d09e979854e27fb7c07c6e625e8225e6608b48ccbba46e733ebb18b7292981e438fdd207b256fcc748a75290035f23a119e2100096a58160b204
-
Filesize
279KB
MD592ab15acb2bbdf3e41148be3ed0bbdf8
SHA1f503b9863b628995c3308124a9f2cdd855de01df
SHA256f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5
SHA512498ef5d71fb0d09e979854e27fb7c07c6e625e8225e6608b48ccbba46e733ebb18b7292981e438fdd207b256fcc748a75290035f23a119e2100096a58160b204
-
Filesize
279KB
MD592ab15acb2bbdf3e41148be3ed0bbdf8
SHA1f503b9863b628995c3308124a9f2cdd855de01df
SHA256f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5
SHA512498ef5d71fb0d09e979854e27fb7c07c6e625e8225e6608b48ccbba46e733ebb18b7292981e438fdd207b256fcc748a75290035f23a119e2100096a58160b204
-
Filesize
279KB
MD592ab15acb2bbdf3e41148be3ed0bbdf8
SHA1f503b9863b628995c3308124a9f2cdd855de01df
SHA256f818c60f918749765be3364701cd2e8dcdd46a5bc4531b9860cbb019b27fc5d5
SHA512498ef5d71fb0d09e979854e27fb7c07c6e625e8225e6608b48ccbba46e733ebb18b7292981e438fdd207b256fcc748a75290035f23a119e2100096a58160b204