Analysis
-
max time kernel
41s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2023 18:37
Static task
static1
Behavioral task
behavioral1
Sample
7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe
Resource
win10v2004-20230220-en
General
-
Target
7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe
-
Size
702KB
-
MD5
ab8f0580cc0d74e0215e7de19515c8a6
-
SHA1
acbbba95fc6982f63bcc1981d7d33df26a8d439d
-
SHA256
7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f
-
SHA512
dfe6b8194dcd56599dba09be3b5746350dee3572f34a4661c42a4597e5938c4a3d82300b7eacb116c68ec0c974c10abf3ad51aa36bbcf4ce043754aca73fce96
-
SSDEEP
12288:U4LGLJtHUGH3HV3y9dsrlHMg2i6lqHIAkIdV2:YxHV3g2HmlPM
Malware Config
Extracted
C:\Program Files\Common Files\microsoft shared\ClickToRun\ReadMe.txt
http://34vm2smykaqtzzzm4bgycfzg5fwyhhksrkpahdbiswmmuwuu7hmvuvqd.onion/?501GYZBDEGH
https://yip.su/2QstD5
Signatures
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Program Files\desktop.ini 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened (read-only) \??\M: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened (read-only) \??\T: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened (read-only) \??\P: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened (read-only) \??\G: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened (read-only) \??\H: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened (read-only) \??\J: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened (read-only) \??\V: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened (read-only) \??\R: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened (read-only) \??\Y: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened (read-only) \??\U: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened (read-only) \??\A: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened (read-only) \??\K: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened (read-only) \??\L: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened (read-only) \??\Q: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened (read-only) \??\W: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened (read-only) \??\E: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened (read-only) \??\I: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened (read-only) \??\S: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened (read-only) \??\F: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened (read-only) \??\X: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened (read-only) \??\O: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened (read-only) \??\Z: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened (read-only) \??\N: 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4024 set thread context of 2156 4024 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 98 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\es.pak 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\fa.pak 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.uk-ua.dll 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\System\ado\msadrh15.dll 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\System\msadc\msdaremr.dll 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\msdasqlr.dll.mui 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsdeu.xml 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsfra.xml 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\tpcps.dll 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\ReadMe.txt 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File created C:\Program Files\Common Files\microsoft shared\ink\sr-Latn-RS\ReadMe.txt 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File created C:\Program Files\Common Files\System\msadc\en-US\ReadMe.txt 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIsvApi.dll 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\mip.exe.mui 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipstr.xml 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\v8_context_snapshot.bin 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ro-ro.dll 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\pkeyconfig.companion.dll 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\msaddsr.dll.mui 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\msix.dll 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pt-BR\tipresx.dll.mui 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pt-PT\tipresx.dll.mui 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\msdatl3.dll 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClientIsv.man 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\msvcr120.dll 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsen.xml 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\libGLESv2.dll 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File created C:\Program Files\Common Files\microsoft shared\ink\el-GR\ReadMe.txt 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File created C:\Program Files\Common Files\microsoft shared\ink\fi-FI\ReadMe.txt 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File created C:\Program Files\Common Files\microsoft shared\Triedit\en-US\ReadMe.txt 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-string-l1-1-0.dll 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\oledb32r.dll.mui 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-time-l1-1-0.dll 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\nl-NL\tipresx.dll.mui 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\vstoee90.tlb 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\ReadMe.txt 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File created C:\Program Files\Common Files\microsoft shared\ink\nb-NO\ReadMe.txt 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-processthreads-l1-1-1.dll 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\concrt140.dll 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\msdasql.dll 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\sv.pak 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\ReadMe.txt 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pt-pt.dll 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\ShapeCollector.exe.mui 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\micaut.dll 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVOrchestration.dll 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hwrenUSlm.dat 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsesp.xml 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\System\msadc\msdarem.dll 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\InkObj.dll.mui 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\ja-jp.xml 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\it-IT\tipresx.dll.mui 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\fr.pak 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-multibyte-l1-1-0.dll 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVManifest.dll 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RHeartbeatConfig.xml 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\vk_swiftshader_icd.json 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\osknumpadbase.xml 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 2156 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4024 wrote to memory of 2156 4024 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 98 PID 4024 wrote to memory of 2156 4024 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 98 PID 4024 wrote to memory of 2156 4024 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 98 PID 4024 wrote to memory of 2156 4024 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 98 PID 4024 wrote to memory of 2156 4024 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 98 PID 4024 wrote to memory of 2156 4024 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 98 PID 4024 wrote to memory of 2156 4024 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 98 PID 4024 wrote to memory of 2156 4024 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 98 PID 4024 wrote to memory of 2156 4024 7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe"C:\Users\Admin\AppData\Local\Temp\7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe"{path}"2⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2156
-
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:5888
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:9540
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:11204
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:21076
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:21120
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:36932
-
C:\Windows\system32\werfault.exewerfault.exe /hc /shared Global\2d1762768c0d4926bd07329887adc7b4 /t 21156 /p 211201⤵PID:1468
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:5072
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
850B
MD57f3438f64524b57c48330a1a53391c9f
SHA13b50696a990efce545152d98cc8ea3f08ea70a4e
SHA2562e680bb7b91b37c8612d95be766330bb422bfd490dd2cc093df2365c47cea750
SHA512c29874c923a49173b88706b04e40bd23d4def7f91e1dfd11dce54ff955f629f7e76a33225eb774510d7c853a30e8fe3c82ce4d32e8fc3f16d9c6a22fc9a150d8
-
C:\ProgramData\Microsoft\ClickToRun\MachineData\Catalog\Packages\{9AC08E99-230B-47E8-9721-4577B7F124EA}\{1A8308C7-90D1-4200-B16E-646F163A08E8}\Manifest.xml
Filesize3.3MB
MD5073ab92bcf0efa9798965c7c0faed41b
SHA1ac17e266e9a1870fa3fa4d98a2434109f327cec9
SHA25648a5999cf81e81c1c1c495a6a9b10a9ab4176994cc760633e8f6b14d2f8e58c1
SHA5125f3d587a79ff9a5cb4e1b47e1870379ddbc9cfb87820bdc591bcd70be7c48e52b9e4b34210ad11564780fa2136a7dc9160fcdf6f4bb28817b41320d48f0da014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63
Filesize1KB
MD5e9fdfe236ec13581f7ab002a6fc96598
SHA157664871e73e018b7d191a8033a49967d402a54a
SHA25610264c4093f59d64102b1f2d8d887834f9bd053fe97bac2d3997ac58f7abaceb
SHA5124338121b6aea1622d0db4de40fb55ac613de8040c0f1b61db8cad27d8cff54ae3c38293c3e4cbfdfe54deec90993c1129301c3a4d812d424ee0964a6fbacafc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63
Filesize434B
MD5c2e27ef8f01717f2d21984d90919eb5a
SHA1c0a73c1cc0597df6aff21ec267a9381f204b2ecb
SHA256c664b0be13a2217296481665be55660615ada9eef5f80062d48fe9b9cad697cd
SHA512366592ef0a9cb7465a82a05524f49ab702b12388ea3ae07cd69a9792d65199fb0f59e9c37e35dfd26508f4de2d300d45a038eda846df7239199c8285fd6d0abc
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\7177160e81c4ed90b8e6551d1dcb1877f697cbc9faa6b66f85976e2a4179154f.exe.log
Filesize1KB
MD516d8e25807e9da7f68124aefcc815546
SHA1ad3907f6d1ec27fc197ba21df6caa607dc588a59
SHA2561693bc4731965496deb1eaa92e6aa7209f87cbb985322f5e0203d8e3d9f2a25f
SHA5127033d6be40dd684ae62cf8edcb74ef4dfe4a6ad68768083b259304b631461f2e73acfea686a4295ee22050569d4f61728be12e9fe006fc290cfd3fa5ad04d66c