Analysis
-
max time kernel
1199s -
max time network
1201s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
08-03-2023 20:44
Static task
static1
Behavioral task
behavioral1
Sample
1.zip
Resource
win10-20230220-en
General
-
Target
1.zip
-
Size
178KB
-
MD5
03f26e0d4c481b27eaf276963337311c
-
SHA1
854b995c2508960f93fdff419a955ac72844e78b
-
SHA256
9f94021d4e3b56b43a8be387f933db96d3f204601b9d3137559b3ae944650edb
-
SHA512
6effe344370843091a2d060b6b18d3024023249fea0cec017523d9430e06e067fbbef5ad9b7f1b9712236980ff4f73bc0322064eedbbb37cc3216aacc4956e97
-
SSDEEP
3072:ENOkf7P32G6nFAuWOfD3IDPcVXvp6xuTA+DQEALq+mYo7VQ0xBexnewAKHCfGID:ENOkfCxFAFyI4Fp4/+D69md7KTxnewfm
Malware Config
Signatures
-
Detects PlugX payload 31 IoCs
Processes:
resource yara_rule behavioral1/memory/3220-133-0x0000000002340000-0x000000000237C000-memory.dmp family_plugx behavioral1/memory/3220-146-0x0000000002340000-0x000000000237C000-memory.dmp family_plugx behavioral1/memory/5020-153-0x0000000001FB0000-0x0000000001FEC000-memory.dmp family_plugx behavioral1/memory/4924-157-0x0000000000EA0000-0x0000000000EDC000-memory.dmp family_plugx behavioral1/memory/4996-158-0x0000000000CC0000-0x0000000000CFC000-memory.dmp family_plugx behavioral1/memory/4996-160-0x0000000000CC0000-0x0000000000CFC000-memory.dmp family_plugx behavioral1/memory/4924-159-0x0000000000EA0000-0x0000000000EDC000-memory.dmp family_plugx behavioral1/memory/4996-168-0x0000000000CC0000-0x0000000000CFC000-memory.dmp family_plugx behavioral1/memory/4996-169-0x0000000000CC0000-0x0000000000CFC000-memory.dmp family_plugx behavioral1/memory/4996-170-0x0000000000CC0000-0x0000000000CFC000-memory.dmp family_plugx behavioral1/memory/4996-171-0x0000000000CC0000-0x0000000000CFC000-memory.dmp family_plugx behavioral1/memory/4996-172-0x0000000000CC0000-0x0000000000CFC000-memory.dmp family_plugx behavioral1/memory/4996-173-0x0000000000CC0000-0x0000000000CFC000-memory.dmp family_plugx behavioral1/memory/4996-176-0x0000000000CC0000-0x0000000000CFC000-memory.dmp family_plugx behavioral1/memory/5020-177-0x0000000001FB0000-0x0000000001FEC000-memory.dmp family_plugx behavioral1/memory/4996-178-0x0000000000CC0000-0x0000000000CFC000-memory.dmp family_plugx behavioral1/memory/4996-180-0x0000000000CC0000-0x0000000000CFC000-memory.dmp family_plugx behavioral1/memory/784-183-0x00000000034B0000-0x00000000034EC000-memory.dmp family_plugx behavioral1/memory/784-185-0x00000000034B0000-0x00000000034EC000-memory.dmp family_plugx behavioral1/memory/784-186-0x00000000034B0000-0x00000000034EC000-memory.dmp family_plugx behavioral1/memory/784-187-0x00000000034B0000-0x00000000034EC000-memory.dmp family_plugx behavioral1/memory/784-188-0x00000000034B0000-0x00000000034EC000-memory.dmp family_plugx behavioral1/memory/4996-189-0x0000000000CC0000-0x0000000000CFC000-memory.dmp family_plugx behavioral1/memory/784-190-0x00000000034B0000-0x00000000034EC000-memory.dmp family_plugx behavioral1/memory/4996-191-0x0000000000CC0000-0x0000000000CFC000-memory.dmp family_plugx behavioral1/memory/4996-194-0x0000000000CC0000-0x0000000000CFC000-memory.dmp family_plugx behavioral1/memory/4996-196-0x0000000000CC0000-0x0000000000CFC000-memory.dmp family_plugx behavioral1/memory/4996-198-0x0000000000CC0000-0x0000000000CFC000-memory.dmp family_plugx behavioral1/memory/4996-200-0x0000000000CC0000-0x0000000000CFC000-memory.dmp family_plugx behavioral1/memory/4996-202-0x0000000000CC0000-0x0000000000CFC000-memory.dmp family_plugx behavioral1/memory/4996-204-0x0000000000CC0000-0x0000000000CFC000-memory.dmp family_plugx -
Executes dropped EXE 3 IoCs
Processes:
esetservice.exeesetservice.exeesetservice.exepid process 3220 esetservice.exe 5020 esetservice.exe 4924 esetservice.exe -
Loads dropped DLL 3 IoCs
Processes:
esetservice.exeesetservice.exeesetservice.exepid process 3220 esetservice.exe 5020 esetservice.exe 4924 esetservice.exe -
Unexpected DNS network traffic destination 10 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 167.179.110.17 Destination IP 167.179.110.17 Destination IP 167.179.110.17 Destination IP 167.179.110.17 Destination IP 167.179.110.17 Destination IP 167.179.110.17 Destination IP 167.179.110.17 Destination IP 167.179.110.17 Destination IP 167.179.110.17 Destination IP 167.179.110.17 -
Drops file in System32 directory 5 IoCs
Processes:
runonce.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat runonce.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 runonce.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE runonce.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies runonce.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 runonce.exe -
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies registry class 43 IoCs
Processes:
explorer.exerunonce.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\MaxPos1280x720x96(1).x = "4294967295" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).top = "50" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).right = "1050" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\MinPos1280x720x96(1).x = "4294967295" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).left = "250" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\0 explorer.exe Key created \REGISTRY\MACHINE\Software\CLASSES\FASU runonce.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FASU\CLSID = 37003900340031003400300031003200340035004200440031003600300032000000 runonce.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\MinPos1280x720x96(1).y = "4294967295" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\MaxPos1280x720x96(1).y = "4294967295" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Generic" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).bottom = "650" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\HotKey = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
explorer.exepid process 4340 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
runonce.exemsiexec.exepid process 4996 runonce.exe 4996 runonce.exe 4996 runonce.exe 4996 runonce.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 4996 runonce.exe 4996 runonce.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 4996 runonce.exe 4996 runonce.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 4996 runonce.exe 4996 runonce.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 4996 runonce.exe 4996 runonce.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 784 msiexec.exe 4996 runonce.exe 4996 runonce.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
runonce.exemsiexec.exepid process 4996 runonce.exe 784 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
7zG.exeesetservice.exeesetservice.exeesetservice.exerunonce.exemsiexec.exedescription pid process Token: SeRestorePrivilege 1696 7zG.exe Token: 35 1696 7zG.exe Token: SeSecurityPrivilege 1696 7zG.exe Token: SeSecurityPrivilege 1696 7zG.exe Token: SeDebugPrivilege 3220 esetservice.exe Token: SeTcbPrivilege 3220 esetservice.exe Token: SeDebugPrivilege 5020 esetservice.exe Token: SeTcbPrivilege 5020 esetservice.exe Token: SeDebugPrivilege 4924 esetservice.exe Token: SeTcbPrivilege 4924 esetservice.exe Token: SeDebugPrivilege 4996 runonce.exe Token: SeTcbPrivilege 4996 runonce.exe Token: SeDebugPrivilege 784 msiexec.exe Token: SeTcbPrivilege 784 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
7zG.exeexplorer.exepid process 1696 7zG.exe 4340 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
explorer.exepid process 4340 explorer.exe 4340 explorer.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
cmd.exeesetservice.exerunonce.exedescription pid process target process PID 4448 wrote to memory of 1288 4448 cmd.exe explorer.exe PID 4448 wrote to memory of 1288 4448 cmd.exe explorer.exe PID 4448 wrote to memory of 3220 4448 cmd.exe esetservice.exe PID 4448 wrote to memory of 3220 4448 cmd.exe esetservice.exe PID 4448 wrote to memory of 3220 4448 cmd.exe esetservice.exe PID 4924 wrote to memory of 4996 4924 esetservice.exe runonce.exe PID 4924 wrote to memory of 4996 4924 esetservice.exe runonce.exe PID 4924 wrote to memory of 4996 4924 esetservice.exe runonce.exe PID 4924 wrote to memory of 4996 4924 esetservice.exe runonce.exe PID 4924 wrote to memory of 4996 4924 esetservice.exe runonce.exe PID 4924 wrote to memory of 4996 4924 esetservice.exe runonce.exe PID 4924 wrote to memory of 4996 4924 esetservice.exe runonce.exe PID 4924 wrote to memory of 4996 4924 esetservice.exe runonce.exe PID 4448 wrote to memory of 4700 4448 cmd.exe rundll32.exe PID 4448 wrote to memory of 4700 4448 cmd.exe rundll32.exe PID 4996 wrote to memory of 784 4996 runonce.exe msiexec.exe PID 4996 wrote to memory of 784 4996 runonce.exe msiexec.exe PID 4996 wrote to memory of 784 4996 runonce.exe msiexec.exe PID 4996 wrote to memory of 784 4996 runonce.exe msiexec.exe PID 4996 wrote to memory of 784 4996 runonce.exe msiexec.exe PID 4996 wrote to memory of 784 4996 runonce.exe msiexec.exe PID 4996 wrote to memory of 784 4996 runonce.exe msiexec.exe PID 4996 wrote to memory of 784 4996 runonce.exe msiexec.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\1.zip1⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\explorer.exeexplorer .2⤵
-
C:\Users\Admin\AppData\Local\Temp\esetservice.exeesetservice.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\rundll32.exerundll32 http_dll.dll2⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\" -an -ai#7zMap21614:82:7zEvent26891⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\ProgramData\Windows NT\Windows eset service\esetservice.exe"C:\ProgramData\\Windows NT\\Windows eset service\esetservice.exe" 100 32201⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\Windows NT\Windows eset service\esetservice.exe"C:\ProgramData\Windows NT\Windows eset service\esetservice.exe" 200 01⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\runonce.exeC:\Windows\system32\runonce.exe 201 02⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe 209 49963⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Windows NT\Windows eset service\esetservice.exeFilesize
32KB
MD568d91a34ce51cf15c45dd68f7f1257e8
SHA15d076537f56ee7389410698d700cc4fd7d736453
SHA25681698c9d6e69506637208ca564b14b7febbfe4efbc574c490332a985adcbb12d
SHA512e4cec6a713537d51451752c06e69e98b8053c3d50a5628e30adc770a883e946573757b4e10689a3e40023a19f5ed2f9d4890d07ced71726d1c984bf9130bcb65
-
C:\ProgramData\Windows NT\Windows eset service\esetservice.exeFilesize
32KB
MD568d91a34ce51cf15c45dd68f7f1257e8
SHA15d076537f56ee7389410698d700cc4fd7d736453
SHA25681698c9d6e69506637208ca564b14b7febbfe4efbc574c490332a985adcbb12d
SHA512e4cec6a713537d51451752c06e69e98b8053c3d50a5628e30adc770a883e946573757b4e10689a3e40023a19f5ed2f9d4890d07ced71726d1c984bf9130bcb65
-
C:\ProgramData\Windows NT\Windows eset service\esetservice.exeFilesize
32KB
MD568d91a34ce51cf15c45dd68f7f1257e8
SHA15d076537f56ee7389410698d700cc4fd7d736453
SHA25681698c9d6e69506637208ca564b14b7febbfe4efbc574c490332a985adcbb12d
SHA512e4cec6a713537d51451752c06e69e98b8053c3d50a5628e30adc770a883e946573757b4e10689a3e40023a19f5ed2f9d4890d07ced71726d1c984bf9130bcb65
-
C:\ProgramData\Windows NT\Windows eset service\esetservice.exeFilesize
32KB
MD568d91a34ce51cf15c45dd68f7f1257e8
SHA15d076537f56ee7389410698d700cc4fd7d736453
SHA25681698c9d6e69506637208ca564b14b7febbfe4efbc574c490332a985adcbb12d
SHA512e4cec6a713537d51451752c06e69e98b8053c3d50a5628e30adc770a883e946573757b4e10689a3e40023a19f5ed2f9d4890d07ced71726d1c984bf9130bcb65
-
C:\ProgramData\Windows NT\Windows eset service\http_dll.dllFilesize
45KB
MD5d1a06b95c1d7ceaa4dc4c8b85367d673
SHA1766b56f2a91581a20d4e8c3b311007dac3c09177
SHA256b700a48ba312c1b9deeac9fcf57ed426e79c8466327f1a4f5b1b057f2ca908e8
SHA5126d7f1f3be71316afe7d10b1e474d3e599353411f70d79182f013f6e653fa9a1d7ff81070c639ff55486eaad4da9de8bc6005c80b31b29fbf3211047c163d14fa
-
C:\ProgramData\Windows NT\Windows eset service\http_dll.dllFilesize
45KB
MD5d1a06b95c1d7ceaa4dc4c8b85367d673
SHA1766b56f2a91581a20d4e8c3b311007dac3c09177
SHA256b700a48ba312c1b9deeac9fcf57ed426e79c8466327f1a4f5b1b057f2ca908e8
SHA5126d7f1f3be71316afe7d10b1e474d3e599353411f70d79182f013f6e653fa9a1d7ff81070c639ff55486eaad4da9de8bc6005c80b31b29fbf3211047c163d14fa
-
C:\ProgramData\Windows NT\Windows eset service\lang.datFilesize
141KB
MD5d973223b0329118de57055177d78817b
SHA1953a3d81eaacf9cd3a4c0e2708ae33f12fb352ad
SHA256edfb699cbf082db13c59fe2695c64287baa46e96721c8a82eba04d718778091e
SHA512eead4c06792c825f21b5b0f99a95ed2c9be9e572e6f49ba00660bf756fb59beb96cc1cd5f3444b48b218bbf9e1f2fd549a36b9ab35e26c160b3675ac95db0bf5
-
C:\ProgramData\Windows NT\Windows eset service\lang.datFilesize
141KB
MD5d973223b0329118de57055177d78817b
SHA1953a3d81eaacf9cd3a4c0e2708ae33f12fb352ad
SHA256edfb699cbf082db13c59fe2695c64287baa46e96721c8a82eba04d718778091e
SHA512eead4c06792c825f21b5b0f99a95ed2c9be9e572e6f49ba00660bf756fb59beb96cc1cd5f3444b48b218bbf9e1f2fd549a36b9ab35e26c160b3675ac95db0bf5
-
C:\Users\Admin\AppData\Local\Temp\esetservice.exeFilesize
32KB
MD568d91a34ce51cf15c45dd68f7f1257e8
SHA15d076537f56ee7389410698d700cc4fd7d736453
SHA25681698c9d6e69506637208ca564b14b7febbfe4efbc574c490332a985adcbb12d
SHA512e4cec6a713537d51451752c06e69e98b8053c3d50a5628e30adc770a883e946573757b4e10689a3e40023a19f5ed2f9d4890d07ced71726d1c984bf9130bcb65
-
C:\Users\Admin\AppData\Local\Temp\esetservice.exeFilesize
32KB
MD568d91a34ce51cf15c45dd68f7f1257e8
SHA15d076537f56ee7389410698d700cc4fd7d736453
SHA25681698c9d6e69506637208ca564b14b7febbfe4efbc574c490332a985adcbb12d
SHA512e4cec6a713537d51451752c06e69e98b8053c3d50a5628e30adc770a883e946573757b4e10689a3e40023a19f5ed2f9d4890d07ced71726d1c984bf9130bcb65
-
C:\Users\Admin\AppData\Local\Temp\http_dll.dllFilesize
45KB
MD5d1a06b95c1d7ceaa4dc4c8b85367d673
SHA1766b56f2a91581a20d4e8c3b311007dac3c09177
SHA256b700a48ba312c1b9deeac9fcf57ed426e79c8466327f1a4f5b1b057f2ca908e8
SHA5126d7f1f3be71316afe7d10b1e474d3e599353411f70d79182f013f6e653fa9a1d7ff81070c639ff55486eaad4da9de8bc6005c80b31b29fbf3211047c163d14fa
-
C:\Users\Admin\AppData\Local\Temp\lang.datFilesize
141KB
MD5d973223b0329118de57055177d78817b
SHA1953a3d81eaacf9cd3a4c0e2708ae33f12fb352ad
SHA256edfb699cbf082db13c59fe2695c64287baa46e96721c8a82eba04d718778091e
SHA512eead4c06792c825f21b5b0f99a95ed2c9be9e572e6f49ba00660bf756fb59beb96cc1cd5f3444b48b218bbf9e1f2fd549a36b9ab35e26c160b3675ac95db0bf5
-
\ProgramData\Windows NT\Windows eset service\http_dll.dllFilesize
45KB
MD5d1a06b95c1d7ceaa4dc4c8b85367d673
SHA1766b56f2a91581a20d4e8c3b311007dac3c09177
SHA256b700a48ba312c1b9deeac9fcf57ed426e79c8466327f1a4f5b1b057f2ca908e8
SHA5126d7f1f3be71316afe7d10b1e474d3e599353411f70d79182f013f6e653fa9a1d7ff81070c639ff55486eaad4da9de8bc6005c80b31b29fbf3211047c163d14fa
-
\ProgramData\Windows NT\Windows eset service\http_dll.dllFilesize
45KB
MD5d1a06b95c1d7ceaa4dc4c8b85367d673
SHA1766b56f2a91581a20d4e8c3b311007dac3c09177
SHA256b700a48ba312c1b9deeac9fcf57ed426e79c8466327f1a4f5b1b057f2ca908e8
SHA5126d7f1f3be71316afe7d10b1e474d3e599353411f70d79182f013f6e653fa9a1d7ff81070c639ff55486eaad4da9de8bc6005c80b31b29fbf3211047c163d14fa
-
\Users\Admin\AppData\Local\Temp\http_dll.dllFilesize
45KB
MD5d1a06b95c1d7ceaa4dc4c8b85367d673
SHA1766b56f2a91581a20d4e8c3b311007dac3c09177
SHA256b700a48ba312c1b9deeac9fcf57ed426e79c8466327f1a4f5b1b057f2ca908e8
SHA5126d7f1f3be71316afe7d10b1e474d3e599353411f70d79182f013f6e653fa9a1d7ff81070c639ff55486eaad4da9de8bc6005c80b31b29fbf3211047c163d14fa
-
memory/784-185-0x00000000034B0000-0x00000000034EC000-memory.dmpFilesize
240KB
-
memory/784-183-0x00000000034B0000-0x00000000034EC000-memory.dmpFilesize
240KB
-
memory/784-190-0x00000000034B0000-0x00000000034EC000-memory.dmpFilesize
240KB
-
memory/784-188-0x00000000034B0000-0x00000000034EC000-memory.dmpFilesize
240KB
-
memory/784-187-0x00000000034B0000-0x00000000034EC000-memory.dmpFilesize
240KB
-
memory/784-186-0x00000000034B0000-0x00000000034EC000-memory.dmpFilesize
240KB
-
memory/784-184-0x0000000000F40000-0x0000000000F41000-memory.dmpFilesize
4KB
-
memory/3220-146-0x0000000002340000-0x000000000237C000-memory.dmpFilesize
240KB
-
memory/3220-133-0x0000000002340000-0x000000000237C000-memory.dmpFilesize
240KB
-
memory/3220-132-0x0000000002200000-0x0000000002300000-memory.dmpFilesize
1024KB
-
memory/4924-157-0x0000000000EA0000-0x0000000000EDC000-memory.dmpFilesize
240KB
-
memory/4924-159-0x0000000000EA0000-0x0000000000EDC000-memory.dmpFilesize
240KB
-
memory/4996-178-0x0000000000CC0000-0x0000000000CFC000-memory.dmpFilesize
240KB
-
memory/4996-168-0x0000000000CC0000-0x0000000000CFC000-memory.dmpFilesize
240KB
-
memory/4996-173-0x0000000000CC0000-0x0000000000CFC000-memory.dmpFilesize
240KB
-
memory/4996-176-0x0000000000CC0000-0x0000000000CFC000-memory.dmpFilesize
240KB
-
memory/4996-204-0x0000000000CC0000-0x0000000000CFC000-memory.dmpFilesize
240KB
-
memory/4996-202-0x0000000000CC0000-0x0000000000CFC000-memory.dmpFilesize
240KB
-
memory/4996-180-0x0000000000CC0000-0x0000000000CFC000-memory.dmpFilesize
240KB
-
memory/4996-171-0x0000000000CC0000-0x0000000000CFC000-memory.dmpFilesize
240KB
-
memory/4996-170-0x0000000000CC0000-0x0000000000CFC000-memory.dmpFilesize
240KB
-
memory/4996-169-0x0000000000CC0000-0x0000000000CFC000-memory.dmpFilesize
240KB
-
memory/4996-167-0x0000000000120000-0x0000000000121000-memory.dmpFilesize
4KB
-
memory/4996-172-0x0000000000CC0000-0x0000000000CFC000-memory.dmpFilesize
240KB
-
memory/4996-160-0x0000000000CC0000-0x0000000000CFC000-memory.dmpFilesize
240KB
-
memory/4996-189-0x0000000000CC0000-0x0000000000CFC000-memory.dmpFilesize
240KB
-
memory/4996-158-0x0000000000CC0000-0x0000000000CFC000-memory.dmpFilesize
240KB
-
memory/4996-191-0x0000000000CC0000-0x0000000000CFC000-memory.dmpFilesize
240KB
-
memory/4996-194-0x0000000000CC0000-0x0000000000CFC000-memory.dmpFilesize
240KB
-
memory/4996-196-0x0000000000CC0000-0x0000000000CFC000-memory.dmpFilesize
240KB
-
memory/4996-198-0x0000000000CC0000-0x0000000000CFC000-memory.dmpFilesize
240KB
-
memory/4996-200-0x0000000000CC0000-0x0000000000CFC000-memory.dmpFilesize
240KB
-
memory/5020-153-0x0000000001FB0000-0x0000000001FEC000-memory.dmpFilesize
240KB
-
memory/5020-177-0x0000000001FB0000-0x0000000001FEC000-memory.dmpFilesize
240KB