Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
134s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
24/05/2023, 12:32
Static task
static1
Behavioral task
behavioral1
Sample
df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe
Resource
win10-20230220-en
General
-
Target
df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe
-
Size
3.3MB
-
MD5
109b1fc3db19488a6569f6d817de86e4
-
SHA1
d7b9e47af0324f27af49f252b63cd97f93d08454
-
SHA256
df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825
-
SHA512
48e8d636dfe8832d69b996e4794cc5d58c04596ff15bc95364ee5881ccde2e000ea1c82db60a7f6df13b31c5385f516ad847eb7bb1d542562ead65d213874b57
-
SSDEEP
98304:1Lxn0mUyL1zbLFPlF4yGDnoeNSE6dPu+Ls/jCwVMaV2:1LxGyL1Z4yG9N0dPu+Ls75
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 2992 rundll32.exe 4 2992 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2992 rundll32.exe -
Suspicious use of SetThreadContext 17 IoCs
description pid Process procid_target PID 2408 set thread context of 2548 2408 df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe 66 PID 2992 set thread context of 3676 2992 rundll32.exe 68 PID 2992 set thread context of 3864 2992 rundll32.exe 70 PID 2992 set thread context of 4848 2992 rundll32.exe 71 PID 2992 set thread context of 3276 2992 rundll32.exe 72 PID 2992 set thread context of 5016 2992 rundll32.exe 73 PID 2992 set thread context of 5076 2992 rundll32.exe 74 PID 2992 set thread context of 1584 2992 rundll32.exe 75 PID 2992 set thread context of 1428 2992 rundll32.exe 76 PID 2992 set thread context of 4140 2992 rundll32.exe 77 PID 2992 set thread context of 2616 2992 rundll32.exe 78 PID 2992 set thread context of 2472 2992 rundll32.exe 79 PID 2992 set thread context of 4088 2992 rundll32.exe 80 PID 2992 set thread context of 4716 2992 rundll32.exe 81 PID 2992 set thread context of 2904 2992 rundll32.exe 82 PID 2992 set thread context of 3444 2992 rundll32.exe 83 PID 2992 set thread context of 4400 2992 rundll32.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 17 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 50003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014000000 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe -
Suspicious use of FindShellTrayWindow 16 IoCs
pid Process 3676 rundll32.exe 3864 rundll32.exe 4848 rundll32.exe 3276 rundll32.exe 5016 rundll32.exe 5076 rundll32.exe 1584 rundll32.exe 1428 rundll32.exe 4140 rundll32.exe 2616 rundll32.exe 2472 rundll32.exe 4088 rundll32.exe 4716 rundll32.exe 2904 rundll32.exe 3444 rundll32.exe 4400 rundll32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2548 2408 df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe 66 PID 2408 wrote to memory of 2548 2408 df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe 66 PID 2408 wrote to memory of 2548 2408 df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe 66 PID 2408 wrote to memory of 2548 2408 df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe 66 PID 2408 wrote to memory of 2548 2408 df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe 66 PID 2408 wrote to memory of 2548 2408 df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe 66 PID 2408 wrote to memory of 2548 2408 df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe 66 PID 2408 wrote to memory of 2548 2408 df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe 66 PID 2408 wrote to memory of 2548 2408 df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe 66 PID 2408 wrote to memory of 2548 2408 df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe 66 PID 2408 wrote to memory of 2548 2408 df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe 66 PID 2408 wrote to memory of 2548 2408 df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe 66 PID 2408 wrote to memory of 2548 2408 df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe 66 PID 2408 wrote to memory of 2548 2408 df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe 66 PID 2408 wrote to memory of 2548 2408 df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe 66 PID 2408 wrote to memory of 2548 2408 df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe 66 PID 2548 wrote to memory of 2992 2548 df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe 67 PID 2548 wrote to memory of 2992 2548 df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe 67 PID 2548 wrote to memory of 2992 2548 df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe 67 PID 2992 wrote to memory of 3676 2992 rundll32.exe 68 PID 2992 wrote to memory of 3676 2992 rundll32.exe 68 PID 2992 wrote to memory of 3676 2992 rundll32.exe 68 PID 2992 wrote to memory of 3864 2992 rundll32.exe 70 PID 2992 wrote to memory of 3864 2992 rundll32.exe 70 PID 2992 wrote to memory of 3864 2992 rundll32.exe 70 PID 2992 wrote to memory of 4848 2992 rundll32.exe 71 PID 2992 wrote to memory of 4848 2992 rundll32.exe 71 PID 2992 wrote to memory of 4848 2992 rundll32.exe 71 PID 2992 wrote to memory of 3276 2992 rundll32.exe 72 PID 2992 wrote to memory of 3276 2992 rundll32.exe 72 PID 2992 wrote to memory of 3276 2992 rundll32.exe 72 PID 2992 wrote to memory of 5016 2992 rundll32.exe 73 PID 2992 wrote to memory of 5016 2992 rundll32.exe 73 PID 2992 wrote to memory of 5016 2992 rundll32.exe 73 PID 2992 wrote to memory of 5076 2992 rundll32.exe 74 PID 2992 wrote to memory of 5076 2992 rundll32.exe 74 PID 2992 wrote to memory of 5076 2992 rundll32.exe 74 PID 2992 wrote to memory of 1584 2992 rundll32.exe 75 PID 2992 wrote to memory of 1584 2992 rundll32.exe 75 PID 2992 wrote to memory of 1584 2992 rundll32.exe 75 PID 2992 wrote to memory of 1428 2992 rundll32.exe 76 PID 2992 wrote to memory of 1428 2992 rundll32.exe 76 PID 2992 wrote to memory of 1428 2992 rundll32.exe 76 PID 2992 wrote to memory of 4140 2992 rundll32.exe 77 PID 2992 wrote to memory of 4140 2992 rundll32.exe 77 PID 2992 wrote to memory of 4140 2992 rundll32.exe 77 PID 2992 wrote to memory of 2616 2992 rundll32.exe 78 PID 2992 wrote to memory of 2616 2992 rundll32.exe 78 PID 2992 wrote to memory of 2616 2992 rundll32.exe 78 PID 2992 wrote to memory of 2472 2992 rundll32.exe 79 PID 2992 wrote to memory of 2472 2992 rundll32.exe 79 PID 2992 wrote to memory of 2472 2992 rundll32.exe 79 PID 2992 wrote to memory of 4088 2992 rundll32.exe 80 PID 2992 wrote to memory of 4088 2992 rundll32.exe 80 PID 2992 wrote to memory of 4088 2992 rundll32.exe 80 PID 2992 wrote to memory of 4716 2992 rundll32.exe 81 PID 2992 wrote to memory of 4716 2992 rundll32.exe 81 PID 2992 wrote to memory of 4716 2992 rundll32.exe 81 PID 2992 wrote to memory of 2904 2992 rundll32.exe 82 PID 2992 wrote to memory of 2904 2992 rundll32.exe 82 PID 2992 wrote to memory of 2904 2992 rundll32.exe 82 PID 2992 wrote to memory of 3444 2992 rundll32.exe 83 PID 2992 wrote to memory of 3444 2992 rundll32.exe 83 PID 2992 wrote to memory of 3444 2992 rundll32.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe"C:\Users\Admin\AppData\Local\Temp\df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe"C:\Users\Admin\AppData\Local\Temp\df91f09bb69f751c9adfe0f7cdf37200e0867b1e23e053c782298335b1260825.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Wyhfteohi.dll,start3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 239944⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:3676
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 239944⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:3864
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 239944⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4848
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 239944⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:3276
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 239944⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:5016
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 239944⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:5076
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 239944⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1584
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 239944⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1428
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 239944⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4140
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 239944⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:2616
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 239944⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:2472
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 239944⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4088
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 239944⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4716
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 239944⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:2904
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 239944⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:3444
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 239944⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4400
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 239944⤵PID:4124
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3040
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
403KB
MD5b4d3016a1cccde90a62b685149c832f9
SHA15d6c4ba3474e6544bd24343da564e90bba89f6f7
SHA256df6afa046a72bb55e8984cf9e2870dc62112e4b81d4fef5a94c98e1c4386e373
SHA512abf5e15b40fa03eb9390854199b9feaf0132aac756c5f07d45c81f58c8b4d909833a996a19ccfef7abb905ddb9206591b1eda49a4674bc75a7c5a9c6372590e7
-
Filesize
3.2MB
MD5eba1abe008f5b2ce26c183b21d061070
SHA1ac80dc6b95b5f13dccc1db2c8cc6631da0faffe5
SHA2563a05745d8b3f45f097fd62ad20244e646d6b2a98aac797e2d862006b82fa43f1
SHA5129561ce5f9d22f8f66c527ec09b5db006a5bd382add49f2ed38574cbbd956f1079d05e0823936250b59bf0bd590461f4612c4ff841e91d4fdf047af308592d2da
-
Filesize
3.2MB
MD5eba1abe008f5b2ce26c183b21d061070
SHA1ac80dc6b95b5f13dccc1db2c8cc6631da0faffe5
SHA2563a05745d8b3f45f097fd62ad20244e646d6b2a98aac797e2d862006b82fa43f1
SHA5129561ce5f9d22f8f66c527ec09b5db006a5bd382add49f2ed38574cbbd956f1079d05e0823936250b59bf0bd590461f4612c4ff841e91d4fdf047af308592d2da