Analysis
-
max time kernel
154s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 03:35
Static task
static1
Behavioral task
behavioral1
Sample
a1a84f0f2e2fe33545bb8b0895b81b0fe7e958798045f277e12b1748035c8db9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a1a84f0f2e2fe33545bb8b0895b81b0fe7e958798045f277e12b1748035c8db9.exe
Resource
win10v2004-20220812-en
General
-
Target
a1a84f0f2e2fe33545bb8b0895b81b0fe7e958798045f277e12b1748035c8db9.exe
-
Size
408KB
-
MD5
18c048f72d032cd0e5cead9503e825bc
-
SHA1
5f1e674b36b41762edc9860a9aead49532604e65
-
SHA256
a1a84f0f2e2fe33545bb8b0895b81b0fe7e958798045f277e12b1748035c8db9
-
SHA512
a2e833245f5594f23d86b784b1a24f0077d01fa0a34bde659111f81b1322ed74432385928bda00e8a55abb0370721fe383e67e0ab2be433672aea6e50639ba06
-
SSDEEP
12288:YJYSdnNy8tEeeaMebJxHKWMn33WVmVPlsEiZ:YSANNEu9JxdMnnQiM
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List HPWuSchdb.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile HPWuSchdb.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications HPWuSchdb.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\system32\HPWuSchdb.exe = "C:\\Windows\\system32\\HPWuSchdb.exe:*:Enabled:Explorer" HPWuSchdb.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" HPWuSchdb.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "1" HPWuSchdb.exe -
ModiLoader Second Stage 11 IoCs
resource yara_rule behavioral2/memory/3624-176-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/3624-178-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/3624-179-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/3624-174-0x0000000000000000-mapping.dmp modiloader_stage2 behavioral2/memory/3624-181-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/3624-183-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/3624-195-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/908-197-0x0000000000000000-mapping.dmp modiloader_stage2 behavioral2/memory/908-209-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/908-212-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/908-219-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run reader_sl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Adobe Reader Speed Launcher = "C:\\Windows\\reader_sl.exe" reader_sl.exe -
Executes dropped EXE 12 IoCs
pid Process 4640 uninstall.exe 652 A~NSISu_.exe 1836 HPWuSchdb.exe 3068 HPWuSchdb.exe 2132 hp-357.exe 5100 reader_sl.exe 4092 hp-357.exe 3624 reader_sl.exe 2872 reader_sl.exe 3048 lsass.exe 908 reader_sl.exe 3316 lsass.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Q505INH8-GHF6-0703-7B60-R228UUF0136B} reader_sl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Q505INH8-GHF6-0703-7B60-R228UUF0136B}\StubPath = "\"C:\\Windows\\reader_sl.exe\"" reader_sl.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation hp-357.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation reader_sl.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "1" HPWuSchdb.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a1a84f0f2e2fe33545bb8b0895b81b0fe7e958798045f277e12b1748035c8db9.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RTHDBPL = "C:\\Users\\Admin\\AppData\\Roaming\\SystemProc\\lsass.exe" lsass.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reader_sl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a1a84f0f2e2fe33545bb8b0895b81b0fe7e958798045f277e12b1748035c8db9.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run hp-357.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RTHDBPL = "C:\\Windows\\SysWOW64\\hp-357.exe" hp-357.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe Reader Speed Launcher = "C:\\Windows\\reader_sl.exe" reader_sl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HP Software Updater v1.1 = "C:\\Windows\\system32\\HPWuSchdb.exe" HPWuSchdb.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" HPWuSchdb.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: HPWuSchdb.exe File opened (read-only) \??\M: HPWuSchdb.exe File opened (read-only) \??\U: HPWuSchdb.exe File opened (read-only) \??\Q: HPWuSchdb.exe File opened (read-only) \??\R: HPWuSchdb.exe File opened (read-only) \??\S: HPWuSchdb.exe File opened (read-only) \??\T: HPWuSchdb.exe File opened (read-only) \??\Y: HPWuSchdb.exe File opened (read-only) \??\G: HPWuSchdb.exe File opened (read-only) \??\O: HPWuSchdb.exe File opened (read-only) \??\P: HPWuSchdb.exe File opened (read-only) \??\K: HPWuSchdb.exe File opened (read-only) \??\L: HPWuSchdb.exe File opened (read-only) \??\N: HPWuSchdb.exe File opened (read-only) \??\V: HPWuSchdb.exe File opened (read-only) \??\X: HPWuSchdb.exe File opened (read-only) \??\F: HPWuSchdb.exe File opened (read-only) \??\H: HPWuSchdb.exe File opened (read-only) \??\I: HPWuSchdb.exe File opened (read-only) \??\J: HPWuSchdb.exe File opened (read-only) \??\W: HPWuSchdb.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\HPWuSchdb.exe HPWuSchdb.exe File created C:\Windows\SysWOW64\HPWuSchdb.exe HPWuSchdb.exe File created C:\Windows\SysWOW64\hp-357.exe HPWuSchdb.exe File created C:\Windows\SysWOW64\reader_sl.exe HPWuSchdb.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1836 set thread context of 3068 1836 HPWuSchdb.exe 85 PID 2132 set thread context of 4092 2132 hp-357.exe 88 PID 5100 set thread context of 3624 5100 reader_sl.exe 89 PID 3048 set thread context of 3316 3048 lsass.exe 92 PID 2872 set thread context of 908 2872 reader_sl.exe 93 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\program files\icq\shared folder\Trojan Killer v2.9.4173.exe HPWuSchdb.exe File created C:\program files\emule\incoming\Adobe Illustrator CS4 crack.exe HPWuSchdb.exe File created C:\program files\morpheus\my shared folder\Trojan Killer v2.9.4173.exe HPWuSchdb.exe File created C:\program files\morpheus\my shared folder\LimeWire Pro v4.18.3.exe HPWuSchdb.exe File created C:\program files\icq\shared folder\Myspace theme collection.exe HPWuSchdb.exe File created C:\program files\limewire\shared\Magic Video Converter 8 0 2 18.exe HPWuSchdb.exe File created C:\program files\tesla\files\PDF-XChange Pro.exe HPWuSchdb.exe File created C:\program files\winmx\shared\Alcohol 120 v1.9.7.exe HPWuSchdb.exe File created C:\program files\grokster\my grokster\Adobe Photoshop CS4 crack.exe HPWuSchdb.exe File created C:\program files\grokster\my grokster\Internet Download Manager V5.exe HPWuSchdb.exe File created C:\program files\emule\incoming\Magic Video Converter 8 0 2 18.exe HPWuSchdb.exe File created C:\program files\limewire\shared\Windows 7 Ultimate keygen.exe HPWuSchdb.exe File created C:\program files\tesla\files\Download Accelerator Plus v9.exe HPWuSchdb.exe File created C:\program files\winmx\shared\Magic Video Converter 8 0 2 18.exe HPWuSchdb.exe File created C:\program files\icq\shared folder\Norton Anti-Virus 2010 Enterprise Crack.exe HPWuSchdb.exe File created C:\program files\winmx\shared\RapidShare Killer AIO 2010.exe HPWuSchdb.exe File created C:\program files\grokster\my grokster\Sophos antivirus updater bypass.exe HPWuSchdb.exe File created C:\program files\winmx\shared\CleanMyPC Registry Cleaner v6.02.exe HPWuSchdb.exe File created C:\program files\icq\shared folder\Starcraft2 Crack.exe HPWuSchdb.exe File created C:\program files\morpheus\my shared folder\Ad-aware 2010.exe HPWuSchdb.exe File created C:\program files\morpheus\my shared folder\Power ISO v4.2 + keygen axxo.exe HPWuSchdb.exe File created C:\program files\morpheus\my shared folder\Starcraft2 Oblivion DLL.exe HPWuSchdb.exe File created C:\program files\limewire\shared\BitDefender AntiVirus 2010 Keygen.exe HPWuSchdb.exe File created C:\program files\winmx\shared\Myspace theme collection.exe HPWuSchdb.exe File created C:\program files\icq\shared folder\Nero 9 9.2.6.0 keygen.exe HPWuSchdb.exe File created C:\program files\grokster\my grokster\Alcohol 120 v1.9.7.exe HPWuSchdb.exe File created C:\program files\emule\incoming\Avast 4.8 Professional.exe HPWuSchdb.exe File created C:\program files\morpheus\my shared folder\K-Lite Mega Codec v5.6.1 Portable.exe HPWuSchdb.exe File created C:\program files\morpheus\my shared folder\AnyDVD HD v.6.3.1.8 Beta incl crack.exe HPWuSchdb.exe File created C:\program files\tesla\files\Grand Theft Auto IV (Offline Activation).exe HPWuSchdb.exe File created C:\program files\winmx\shared\Avast 4.8 Professional.exe HPWuSchdb.exe File created C:\program files\grokster\my grokster\Myspace theme collection.exe HPWuSchdb.exe File created C:\program files\emule\incoming\K-Lite Mega Codec v5.6.1 Portable.exe HPWuSchdb.exe File created C:\program files\emule\incoming\McAfee Total Protection 2010.exe HPWuSchdb.exe File created C:\program files\tesla\files\Mp3 Splitter and Joiner Pro v3.48.exe HPWuSchdb.exe File created C:\program files\tesla\files\DVD Tools Nero 10.5.6.0.exe HPWuSchdb.exe File created C:\program files\emule\incoming\VmWare keygen.exe HPWuSchdb.exe File created C:\program files\icq\shared folder\RapidShare Killer AIO 2010.exe HPWuSchdb.exe File created C:\program files\morpheus\my shared folder\Alcohol 120 v1.9.7.exe HPWuSchdb.exe File created C:\program files\tesla\files\Ad-aware 2010.exe HPWuSchdb.exe File created C:\program files\emule\incoming\Motorola, nokia, ericsson mobil phone tools.exe HPWuSchdb.exe File created C:\program files\morpheus\my shared folder\Adobe Acrobat Reader keygen.exe HPWuSchdb.exe File created C:\program files\winmx\shared\Norton Anti-Virus 2010 Enterprise Crack.exe HPWuSchdb.exe File created C:\program files\grokster\my grokster\Trojan Killer v2.9.4173.exe HPWuSchdb.exe File created C:\program files\emule\incoming\Windows 2008 Enterprise Server VMWare Virtual Machine.exe HPWuSchdb.exe File created C:\program files\limewire\shared\Motorola, nokia, ericsson mobil phone tools.exe HPWuSchdb.exe File created C:\program files\winmx\shared\K-Lite Mega Codec v5.5.1.exe HPWuSchdb.exe File created C:\program files\icq\shared folder\Kaspersky AntiVirus 2010 crack.exe HPWuSchdb.exe File created C:\program files\icq\shared folder\DVD Tools Nero 10.5.6.0.exe HPWuSchdb.exe File created C:\program files\emule\incoming\PDF to Word Converter 3.0.exe HPWuSchdb.exe File created C:\program files\limewire\shared\PDF password remover (works with all acrobat reader).exe HPWuSchdb.exe File created C:\program files\tesla\files\Power ISO v4.2 + keygen axxo.exe HPWuSchdb.exe File created C:\program files\grokster\my grokster\Microsoft.Windows 7 ULTIMATE FINAL activator+keygen x86.exe HPWuSchdb.exe File created C:\program files\emule\incoming\Norton Internet Security 2010 crack.exe HPWuSchdb.exe File created C:\program files\limewire\shared\Image Size Reducer Pro v1.0.1.exe HPWuSchdb.exe File created C:\program files\limewire\shared\Anti-Porn v13.5.12.29.exe HPWuSchdb.exe File created C:\program files\emule\incoming\Adobe Photoshop CS4 crack.exe HPWuSchdb.exe File created C:\program files\emule\incoming\BitDefender AntiVirus 2010 Keygen.exe HPWuSchdb.exe File created C:\program files\emule\incoming\Kaspersky Internet Security 2010 keygen.exe HPWuSchdb.exe File created C:\program files\limewire\shared\DVD Tools Nero 10.5.6.0.exe HPWuSchdb.exe File created C:\program files\tesla\files\Windows 7 Ultimate keygen.exe HPWuSchdb.exe File created C:\program files\tesla\files\Rapidshare Auto Downloader 3.8.exe HPWuSchdb.exe File created C:\program files\emule\incoming\Absolute Video Converter 6.2.exe HPWuSchdb.exe File created C:\program files\winmx\shared\K-Lite Mega Codec v5.6.1 Portable.exe HPWuSchdb.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\reader_sl.exe reader_sl.exe File opened for modification C:\Windows\reader_sl.exe reader_sl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x0007000000022e43-133.dat nsis_installer_1 behavioral2/files/0x0007000000022e43-134.dat nsis_installer_1 behavioral2/files/0x0006000000022e47-136.dat nsis_installer_1 behavioral2/files/0x0006000000022e47-137.dat nsis_installer_1 -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ reader_sl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ hp-357.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe 3068 HPWuSchdb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3316 lsass.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1836 HPWuSchdb.exe 2132 hp-357.exe 5100 reader_sl.exe 2872 reader_sl.exe 3048 lsass.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2688 wrote to memory of 4640 2688 a1a84f0f2e2fe33545bb8b0895b81b0fe7e958798045f277e12b1748035c8db9.exe 80 PID 2688 wrote to memory of 4640 2688 a1a84f0f2e2fe33545bb8b0895b81b0fe7e958798045f277e12b1748035c8db9.exe 80 PID 2688 wrote to memory of 4640 2688 a1a84f0f2e2fe33545bb8b0895b81b0fe7e958798045f277e12b1748035c8db9.exe 80 PID 4640 wrote to memory of 652 4640 uninstall.exe 82 PID 4640 wrote to memory of 652 4640 uninstall.exe 82 PID 4640 wrote to memory of 652 4640 uninstall.exe 82 PID 2688 wrote to memory of 1836 2688 a1a84f0f2e2fe33545bb8b0895b81b0fe7e958798045f277e12b1748035c8db9.exe 83 PID 2688 wrote to memory of 1836 2688 a1a84f0f2e2fe33545bb8b0895b81b0fe7e958798045f277e12b1748035c8db9.exe 83 PID 2688 wrote to memory of 1836 2688 a1a84f0f2e2fe33545bb8b0895b81b0fe7e958798045f277e12b1748035c8db9.exe 83 PID 1836 wrote to memory of 3068 1836 HPWuSchdb.exe 85 PID 1836 wrote to memory of 3068 1836 HPWuSchdb.exe 85 PID 1836 wrote to memory of 3068 1836 HPWuSchdb.exe 85 PID 1836 wrote to memory of 3068 1836 HPWuSchdb.exe 85 PID 1836 wrote to memory of 3068 1836 HPWuSchdb.exe 85 PID 1836 wrote to memory of 3068 1836 HPWuSchdb.exe 85 PID 1836 wrote to memory of 3068 1836 HPWuSchdb.exe 85 PID 1836 wrote to memory of 3068 1836 HPWuSchdb.exe 85 PID 1836 wrote to memory of 3068 1836 HPWuSchdb.exe 85 PID 1836 wrote to memory of 3068 1836 HPWuSchdb.exe 85 PID 1836 wrote to memory of 3068 1836 HPWuSchdb.exe 85 PID 3068 wrote to memory of 2132 3068 HPWuSchdb.exe 86 PID 3068 wrote to memory of 2132 3068 HPWuSchdb.exe 86 PID 3068 wrote to memory of 2132 3068 HPWuSchdb.exe 86 PID 3068 wrote to memory of 5100 3068 HPWuSchdb.exe 87 PID 3068 wrote to memory of 5100 3068 HPWuSchdb.exe 87 PID 3068 wrote to memory of 5100 3068 HPWuSchdb.exe 87 PID 2132 wrote to memory of 4092 2132 hp-357.exe 88 PID 2132 wrote to memory of 4092 2132 hp-357.exe 88 PID 2132 wrote to memory of 4092 2132 hp-357.exe 88 PID 2132 wrote to memory of 4092 2132 hp-357.exe 88 PID 2132 wrote to memory of 4092 2132 hp-357.exe 88 PID 2132 wrote to memory of 4092 2132 hp-357.exe 88 PID 2132 wrote to memory of 4092 2132 hp-357.exe 88 PID 2132 wrote to memory of 4092 2132 hp-357.exe 88 PID 2132 wrote to memory of 4092 2132 hp-357.exe 88 PID 5100 wrote to memory of 3624 5100 reader_sl.exe 89 PID 5100 wrote to memory of 3624 5100 reader_sl.exe 89 PID 5100 wrote to memory of 3624 5100 reader_sl.exe 89 PID 5100 wrote to memory of 3624 5100 reader_sl.exe 89 PID 5100 wrote to memory of 3624 5100 reader_sl.exe 89 PID 5100 wrote to memory of 3624 5100 reader_sl.exe 89 PID 5100 wrote to memory of 3624 5100 reader_sl.exe 89 PID 5100 wrote to memory of 3624 5100 reader_sl.exe 89 PID 5100 wrote to memory of 3624 5100 reader_sl.exe 89 PID 5100 wrote to memory of 3624 5100 reader_sl.exe 89 PID 5100 wrote to memory of 3624 5100 reader_sl.exe 89 PID 5100 wrote to memory of 3624 5100 reader_sl.exe 89 PID 5100 wrote to memory of 3624 5100 reader_sl.exe 89 PID 4092 wrote to memory of 3048 4092 hp-357.exe 90 PID 4092 wrote to memory of 3048 4092 hp-357.exe 90 PID 4092 wrote to memory of 3048 4092 hp-357.exe 90 PID 3624 wrote to memory of 2872 3624 reader_sl.exe 91 PID 3624 wrote to memory of 2872 3624 reader_sl.exe 91 PID 3624 wrote to memory of 2872 3624 reader_sl.exe 91 PID 2872 wrote to memory of 908 2872 reader_sl.exe 93 PID 2872 wrote to memory of 908 2872 reader_sl.exe 93 PID 2872 wrote to memory of 908 2872 reader_sl.exe 93 PID 3048 wrote to memory of 3316 3048 lsass.exe 92 PID 3048 wrote to memory of 3316 3048 lsass.exe 92 PID 3048 wrote to memory of 3316 3048 lsass.exe 92 PID 2872 wrote to memory of 908 2872 reader_sl.exe 93 PID 3048 wrote to memory of 3316 3048 lsass.exe 92 PID 2872 wrote to memory of 908 2872 reader_sl.exe 93 PID 3048 wrote to memory of 3316 3048 lsass.exe 92 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" HPWuSchdb.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\a1a84f0f2e2fe33545bb8b0895b81b0fe7e958798045f277e12b1748035c8db9.exe"C:\Users\Admin\AppData\Local\Temp\a1a84f0f2e2fe33545bb8b0895b81b0fe7e958798045f277e12b1748035c8db9.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uninstall.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uninstall.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe"C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe" _?=C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4⤵
- Executes dropped EXE
PID:652
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPWuSchdb.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPWuSchdb.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPWuSchdb.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPWuSchdb.exe"4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3068 -
C:\Windows\SysWOW64\hp-357.exe"C:\Windows\system32\hp-357.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\hp-357.exe"C:\Windows\SysWOW64\hp-357.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Roaming\SystemProc\lsass.exe"C:\Users\Admin\AppData\Roaming\SystemProc\lsass.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Roaming\SystemProc\lsass.exe"C:\Users\Admin\AppData\Roaming\SystemProc\lsass.exe"8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3316
-
-
-
-
-
C:\Windows\SysWOW64\reader_sl.exe"C:\Windows\system32\reader_sl.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\reader_sl.exe"C:\Windows\SysWOW64\reader_sl.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\reader_sl.exe"C:\Windows\reader_sl.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\reader_sl.exe"C:\Windows\reader_sl.exe"8⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:908 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:4308
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Mozilla Firefox\extensions\{9CE11043-9A15-4207-A565-0C94C42D590D}\chrome.manifest
Filesize151B
MD52fa89bb5ec500c62cc40d5a46a6a8cd3
SHA1ab2c5fed92fb203ff7ca8b3353a9e086377afebd
SHA256bbcea744c5edfaf49d50a046051338c2fc75fd12247ae5997b9967fe3f454543
SHA51241299af72f3f78bd1d82423e36272bcde20441254402b5776537de2d5061d125f80f65bbee07bf5d1609003a784f85caf0e4cadbf91782737ea4aa58a0c51e59
-
C:\Program Files (x86)\Mozilla Firefox\extensions\{9CE11043-9A15-4207-A565-0C94C42D590D}\chrome\content\timer.xul
Filesize1KB
MD58db91883ee3533d23dee7f960f35a86b
SHA17711e7240614ce19fff8efad065ec4945954a64c
SHA256b6dce1cd85ef55a6887abd3cccd6b644e8ca9b877640feb75d072b9c2f9f46a3
SHA5127c5f5e3d363559a8099a9f94fb80f85272a53f7c92413932b2006f6db1c6b47f58e5767a8ef11bf3b8b370ef8a7d149f3feb95d3c4ef67787bc5466a91044373
-
C:\Program Files (x86)\Mozilla Firefox\extensions\{9CE11043-9A15-4207-A565-0C94C42D590D}\install.rdf
Filesize765B
MD578ad4864983e69fdc09b56c0cabf8e70
SHA1dbb7c8129472f7d96b069f8a2a9bd117cbf9c5b6
SHA25630e1fc099fdd3eab43a3e390ef120e143bce0befb0dcc3ae05f52590e06ec26a
SHA51210e6708f51f81ac59bb01043acd11ad74a1bb9d52074d32562edfc60a778f3499033515a524d413f1205e2e133e3390cbed34bde6386766fdf7d4eab0dd018da
-
Filesize
50KB
MD50569bd3afd2ed36ee1a61c0d09587387
SHA1b6afb5fc10a74efb94034feb989143693a8ccf10
SHA256cecc35f773e151a6e7f003f7e7fdf480e82486b80bb64295e318fa6629ba1979
SHA5122d04f8e1a0f8a8b9a28aea13457a9186a20ffaa1a99117b5a85650fb9a5749d5a1df9067c908f7d9c729902f04d97f54828be3af3a32ae7597743dd4bda70f58
-
Filesize
50KB
MD50569bd3afd2ed36ee1a61c0d09587387
SHA1b6afb5fc10a74efb94034feb989143693a8ccf10
SHA256cecc35f773e151a6e7f003f7e7fdf480e82486b80bb64295e318fa6629ba1979
SHA5122d04f8e1a0f8a8b9a28aea13457a9186a20ffaa1a99117b5a85650fb9a5749d5a1df9067c908f7d9c729902f04d97f54828be3af3a32ae7597743dd4bda70f58
-
Filesize
444KB
MD55204fc82a7664cc3edf7f6659308078d
SHA1b40a024600d80d459f0cb8567581407beb538268
SHA2569c37c2481f208a239a8b7f2622397d3e1ecbb30350234371fd86f99be9a50adc
SHA512e21bc59825b8255b4194d36cf8115b592e261075c67b0b3dc6a519efbe539ef95a5d4ae9d32be37ca83d71dd727c309fda032162f9216228da20a58f6ef81607
-
Filesize
444KB
MD55204fc82a7664cc3edf7f6659308078d
SHA1b40a024600d80d459f0cb8567581407beb538268
SHA2569c37c2481f208a239a8b7f2622397d3e1ecbb30350234371fd86f99be9a50adc
SHA512e21bc59825b8255b4194d36cf8115b592e261075c67b0b3dc6a519efbe539ef95a5d4ae9d32be37ca83d71dd727c309fda032162f9216228da20a58f6ef81607
-
Filesize
444KB
MD55204fc82a7664cc3edf7f6659308078d
SHA1b40a024600d80d459f0cb8567581407beb538268
SHA2569c37c2481f208a239a8b7f2622397d3e1ecbb30350234371fd86f99be9a50adc
SHA512e21bc59825b8255b4194d36cf8115b592e261075c67b0b3dc6a519efbe539ef95a5d4ae9d32be37ca83d71dd727c309fda032162f9216228da20a58f6ef81607
-
Filesize
50KB
MD50569bd3afd2ed36ee1a61c0d09587387
SHA1b6afb5fc10a74efb94034feb989143693a8ccf10
SHA256cecc35f773e151a6e7f003f7e7fdf480e82486b80bb64295e318fa6629ba1979
SHA5122d04f8e1a0f8a8b9a28aea13457a9186a20ffaa1a99117b5a85650fb9a5749d5a1df9067c908f7d9c729902f04d97f54828be3af3a32ae7597743dd4bda70f58
-
Filesize
50KB
MD50569bd3afd2ed36ee1a61c0d09587387
SHA1b6afb5fc10a74efb94034feb989143693a8ccf10
SHA256cecc35f773e151a6e7f003f7e7fdf480e82486b80bb64295e318fa6629ba1979
SHA5122d04f8e1a0f8a8b9a28aea13457a9186a20ffaa1a99117b5a85650fb9a5749d5a1df9067c908f7d9c729902f04d97f54828be3af3a32ae7597743dd4bda70f58
-
Filesize
160KB
MD57cc68b28e29370b84e1a7a214b14a238
SHA10fe3d170ab64e5969c56de2b8bd733cba115c034
SHA256a7e9623e4ef1511d8ef30dfb1a5098507e2a2a30ba7f28d2f13266ae08803df7
SHA5123644b427d321fbd1a1891f7197e9dc367367fbb137bcc90ccbc36a0d2c289c8b35f5e6eb295696ebde646f8f24a1a1a1f8e520b60701f11a3aef7a0865d57dbf
-
Filesize
160KB
MD57cc68b28e29370b84e1a7a214b14a238
SHA10fe3d170ab64e5969c56de2b8bd733cba115c034
SHA256a7e9623e4ef1511d8ef30dfb1a5098507e2a2a30ba7f28d2f13266ae08803df7
SHA5123644b427d321fbd1a1891f7197e9dc367367fbb137bcc90ccbc36a0d2c289c8b35f5e6eb295696ebde646f8f24a1a1a1f8e520b60701f11a3aef7a0865d57dbf
-
Filesize
160KB
MD57cc68b28e29370b84e1a7a214b14a238
SHA10fe3d170ab64e5969c56de2b8bd733cba115c034
SHA256a7e9623e4ef1511d8ef30dfb1a5098507e2a2a30ba7f28d2f13266ae08803df7
SHA5123644b427d321fbd1a1891f7197e9dc367367fbb137bcc90ccbc36a0d2c289c8b35f5e6eb295696ebde646f8f24a1a1a1f8e520b60701f11a3aef7a0865d57dbf
-
Filesize
160KB
MD57cc68b28e29370b84e1a7a214b14a238
SHA10fe3d170ab64e5969c56de2b8bd733cba115c034
SHA256a7e9623e4ef1511d8ef30dfb1a5098507e2a2a30ba7f28d2f13266ae08803df7
SHA5123644b427d321fbd1a1891f7197e9dc367367fbb137bcc90ccbc36a0d2c289c8b35f5e6eb295696ebde646f8f24a1a1a1f8e520b60701f11a3aef7a0865d57dbf
-
Filesize
160KB
MD57cc68b28e29370b84e1a7a214b14a238
SHA10fe3d170ab64e5969c56de2b8bd733cba115c034
SHA256a7e9623e4ef1511d8ef30dfb1a5098507e2a2a30ba7f28d2f13266ae08803df7
SHA5123644b427d321fbd1a1891f7197e9dc367367fbb137bcc90ccbc36a0d2c289c8b35f5e6eb295696ebde646f8f24a1a1a1f8e520b60701f11a3aef7a0865d57dbf
-
Filesize
160KB
MD57cc68b28e29370b84e1a7a214b14a238
SHA10fe3d170ab64e5969c56de2b8bd733cba115c034
SHA256a7e9623e4ef1511d8ef30dfb1a5098507e2a2a30ba7f28d2f13266ae08803df7
SHA5123644b427d321fbd1a1891f7197e9dc367367fbb137bcc90ccbc36a0d2c289c8b35f5e6eb295696ebde646f8f24a1a1a1f8e520b60701f11a3aef7a0865d57dbf
-
Filesize
192KB
MD5051e79e7f5f143719483162b9ed7990d
SHA1a96bdd68c60382db841b6b3e9f6afca4152fd81c
SHA256255342ccd4b1602803eb0e51b1042b121054deef421fb2642f0af39f7a88460a
SHA512e2d630480ddf51dc4e25df9f7c77298c881ae3549db2168065559a0757529f69c10b127f80b94929d63307822c09754256bc2faf83f7ce55a709a067f1b0ef50
-
Filesize
192KB
MD5051e79e7f5f143719483162b9ed7990d
SHA1a96bdd68c60382db841b6b3e9f6afca4152fd81c
SHA256255342ccd4b1602803eb0e51b1042b121054deef421fb2642f0af39f7a88460a
SHA512e2d630480ddf51dc4e25df9f7c77298c881ae3549db2168065559a0757529f69c10b127f80b94929d63307822c09754256bc2faf83f7ce55a709a067f1b0ef50
-
Filesize
192KB
MD5051e79e7f5f143719483162b9ed7990d
SHA1a96bdd68c60382db841b6b3e9f6afca4152fd81c
SHA256255342ccd4b1602803eb0e51b1042b121054deef421fb2642f0af39f7a88460a
SHA512e2d630480ddf51dc4e25df9f7c77298c881ae3549db2168065559a0757529f69c10b127f80b94929d63307822c09754256bc2faf83f7ce55a709a067f1b0ef50
-
Filesize
192KB
MD5051e79e7f5f143719483162b9ed7990d
SHA1a96bdd68c60382db841b6b3e9f6afca4152fd81c
SHA256255342ccd4b1602803eb0e51b1042b121054deef421fb2642f0af39f7a88460a
SHA512e2d630480ddf51dc4e25df9f7c77298c881ae3549db2168065559a0757529f69c10b127f80b94929d63307822c09754256bc2faf83f7ce55a709a067f1b0ef50
-
Filesize
192KB
MD5051e79e7f5f143719483162b9ed7990d
SHA1a96bdd68c60382db841b6b3e9f6afca4152fd81c
SHA256255342ccd4b1602803eb0e51b1042b121054deef421fb2642f0af39f7a88460a
SHA512e2d630480ddf51dc4e25df9f7c77298c881ae3549db2168065559a0757529f69c10b127f80b94929d63307822c09754256bc2faf83f7ce55a709a067f1b0ef50
-
Filesize
192KB
MD5051e79e7f5f143719483162b9ed7990d
SHA1a96bdd68c60382db841b6b3e9f6afca4152fd81c
SHA256255342ccd4b1602803eb0e51b1042b121054deef421fb2642f0af39f7a88460a
SHA512e2d630480ddf51dc4e25df9f7c77298c881ae3549db2168065559a0757529f69c10b127f80b94929d63307822c09754256bc2faf83f7ce55a709a067f1b0ef50