Analysis
-
max time kernel
94s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2023, 00:38
Static task
static1
Behavioral task
behavioral1
Sample
1277ca71e55a3848bc68949c772ec14ba48865c03cd2fe9fd2fe66afcf6cd7b9.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1277ca71e55a3848bc68949c772ec14ba48865c03cd2fe9fd2fe66afcf6cd7b9.dll
Resource
win10v2004-20230220-en
General
-
Target
1277ca71e55a3848bc68949c772ec14ba48865c03cd2fe9fd2fe66afcf6cd7b9.dll
-
Size
1.0MB
-
MD5
015592cd0f1256a4eab1be3cfa289359
-
SHA1
9c1bfe861013a94221500d2f104bc00874a3dacb
-
SHA256
1277ca71e55a3848bc68949c772ec14ba48865c03cd2fe9fd2fe66afcf6cd7b9
-
SHA512
ec5f4afd1e028aa3cb5508be64d838d6ccda3ebd17fd102c9383e4e9899d8e4eabb4a70547c0650df6b0a6356c061af75d7232d0551a54a336a53ff339ac80dc
-
SSDEEP
6144:eoXBwewxTr6448g1psPxdxfYKiiVDE71RlHpulnuFPZqtVQgdrwSO3jkPi4b5QJe:rBwhxTuaAfZHuuFIQcOHc9ASsS
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dxkctdwn.lnk Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Dxkctdwn = "\"C:\\Users\\Admin\\AppData\\Roaming\\uZiMW\\dwm.exe\"" Process not Found -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk PowerShell.exe File opened for modification C:\Windows\System32\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk PowerShell.exe File created C:\Windows\system32\2043\phoneactivate.exe cmd.exe File opened for modification C:\Windows\system32\2043\phoneactivate.exe cmd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3576 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\Toolbar Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Process not Found Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Process not Found -
Modifies registry class 45 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\ms-settings\shell\open Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\ms-settings\shell\open\command\ = "C:\\Windows\\system32\\cmd.exe /c C:\\Users\\Admin\\AppData\\Local\\Temp\\eczh.cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\ms-settings\shell\open\command\DelegateExecute Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 56003100000000000000000010004170704461746100400009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004100700070004400610074006100000016000000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\ms-settings Process not Found Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 50003100000000000000000010005573657273003c0009000400efbe00000000000000002e000000000000000000000000000000000000000000000000000000000055007300650072007300000014000000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 500031000000000000000000100041646d696e003c0009000400efbe00000000000000002e0000000000000000000000000000000000000000000000000000000000410064006d0069006e00000014000000 Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\ms-settings\shell\open Process not Found Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 Process not Found Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Process not Found Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 Process not Found Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 Process not Found Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = d900310000000000c156d604100054656d7000003a0009000400efbe5456b6a0c156d6042e00000084e1010000000100000000000000000000000000000020389c00540065006d007000000014008b0000002700efbe7d00000031535053b79daeff8d1cff43818c84403aa3732d6100000064000000001f000000270000004d006900630072006f0073006f00660074002e00570069006e0064006f00770073002e005300650061007200630068005f006300770035006e0031006800320074007800790065007700790000000000000000000000000014000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Process not Found Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\ms-settings\shell\open\command Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Process not Found Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Process not Found Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Process not Found Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\WorkFolders Process not Found Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\ms-settings\shell\open\command Process not Found Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\ms-settings Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\NodeSlot = "1" Process not Found Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\ms-settings\shell Process not Found Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\ms-settings\shell Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 50003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014000000 Process not Found -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3120 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2160 rundll32.exe 2160 rundll32.exe 2160 rundll32.exe 2160 rundll32.exe 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3120 Process not Found -
Suspicious use of AdjustPrivilegeToken 60 IoCs
description pid Process Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeDebugPrivilege 2812 PowerShell.exe Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeDebugPrivilege 3396 PowerShell.exe Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3120 Process not Found 3120 Process not Found -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3120 Process not Found 3120 Process not Found 3120 Process not Found -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 3120 wrote to memory of 2324 3120 Process not Found 85 PID 3120 wrote to memory of 2324 3120 Process not Found 85 PID 3120 wrote to memory of 3932 3120 Process not Found 88 PID 3120 wrote to memory of 3932 3120 Process not Found 88 PID 3120 wrote to memory of 4276 3120 Process not Found 87 PID 3120 wrote to memory of 4276 3120 Process not Found 87 PID 3120 wrote to memory of 4812 3120 Process not Found 86 PID 3120 wrote to memory of 4812 3120 Process not Found 86 PID 3120 wrote to memory of 456 3120 Process not Found 91 PID 3120 wrote to memory of 456 3120 Process not Found 91 PID 3120 wrote to memory of 872 3120 Process not Found 93 PID 3120 wrote to memory of 872 3120 Process not Found 93 PID 3120 wrote to memory of 4360 3120 Process not Found 94 PID 3120 wrote to memory of 4360 3120 Process not Found 94 PID 3120 wrote to memory of 2032 3120 Process not Found 95 PID 3120 wrote to memory of 2032 3120 Process not Found 95 PID 3120 wrote to memory of 2020 3120 Process not Found 96 PID 3120 wrote to memory of 2020 3120 Process not Found 96 PID 3120 wrote to memory of 2704 3120 Process not Found 97 PID 3120 wrote to memory of 2704 3120 Process not Found 97 PID 3120 wrote to memory of 2260 3120 Process not Found 98 PID 3120 wrote to memory of 2260 3120 Process not Found 98 PID 3120 wrote to memory of 4928 3120 Process not Found 99 PID 3120 wrote to memory of 4928 3120 Process not Found 99 PID 3120 wrote to memory of 4492 3120 Process not Found 102 PID 3120 wrote to memory of 4492 3120 Process not Found 102 PID 4492 wrote to memory of 2648 4492 fodhelper.exe 103 PID 4492 wrote to memory of 2648 4492 fodhelper.exe 103 PID 2648 wrote to memory of 3576 2648 cmd.exe 105 PID 2648 wrote to memory of 3576 2648 cmd.exe 105 PID 3120 wrote to memory of 2812 3120 Process not Found 110 PID 3120 wrote to memory of 2812 3120 Process not Found 110 PID 3120 wrote to memory of 3396 3120 Process not Found 118 PID 3120 wrote to memory of 3396 3120 Process not Found 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1277ca71e55a3848bc68949c772ec14ba48865c03cd2fe9fd2fe66afcf6cd7b9.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
C:\Windows\system32\DeviceProperties.exeC:\Windows\system32\DeviceProperties.exe1⤵PID:2324
-
C:\Windows\system32\dwm.exeC:\Windows\system32\dwm.exe1⤵PID:4812
-
C:\Windows\system32\iscsicpl.exeC:\Windows\system32\iscsicpl.exe1⤵PID:4276
-
C:\Windows\system32\LegacyNetUXHost.exeC:\Windows\system32\LegacyNetUXHost.exe1⤵PID:3932
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\69X.cmd1⤵PID:456
-
C:\Windows\system32\TSTheme.exeC:\Windows\system32\TSTheme.exe1⤵PID:872
-
C:\Windows\system32\PrintBrmUi.exeC:\Windows\system32\PrintBrmUi.exe1⤵PID:4360
-
C:\Windows\system32\DTUHandler.exeC:\Windows\system32\DTUHandler.exe1⤵PID:2032
-
C:\Windows\system32\RemotePosWorker.exeC:\Windows\system32\RemotePosWorker.exe1⤵PID:2020
-
C:\Windows\system32\iscsicpl.exeC:\Windows\system32\iscsicpl.exe1⤵PID:2704
-
C:\Windows\system32\phoneactivate.exeC:\Windows\system32\phoneactivate.exe1⤵PID:2260
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\T8j.cmd1⤵
- Drops file in System32 directory
PID:4928
-
C:\Windows\System32\fodhelper.exe"C:\Windows\System32\fodhelper.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\eczh.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\system32\schtasks.exeschtasks.exe /Create /F /TN "Kakxbomh" /SC minute /MO 60 /TR "C:\Windows\system32\2043\phoneactivate.exe" /RL highest3⤵
- Creates scheduled task(s)
PID:3576
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe"PowerShell.exe" -noexit -command Set-Location -literalPath 'C:\Users\Admin\Desktop'1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2096
-
C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe"PowerShell.exe" -noexit -command Set-Location -literalPath 'C:\Users\Admin\AppData\Local\Temp'1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3396 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" .\1277ca71e55a3848bc68949c772ec14ba48865c03cd2fe9fd2fe66afcf6cd7b9.dll,322⤵PID:1640
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5df42e812a6927b8116e5492d332c8a55
SHA15157f905dc1922eb4da32b614ab1720ac2e93622
SHA256ca8cfefe14b45ebd13f55278a04cdbd352d10cb09a9943586e65344ad436169f
SHA5122b60c3c1950925c1be936fbd6c9b2a9382844261f3a8bb5e272818382c2816d01912790977def01002d436c787afc3292e1fbeeb420f20cc7d31d55a4a8d7362
-
Filesize
53KB
MD5a26df49623eff12a70a93f649776dab7
SHA1efb53bd0df3ac34bd119adf8788127ad57e53803
SHA2564ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245
SHA512e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c
-
Filesize
3KB
MD54cfa90981271fb9883f829835e00bbd4
SHA1c45cdfb8247f74bfb592926a25e830290fda6f56
SHA25637d5327863656a272ca47e48b5024896c894dd97b39edee07c1b2dff6f594ef4
SHA512548bbf8b4a2eb8853589a30d975f8df6cb5c6593ab1f3ac86ce605cb69f041b2f7c9ae4d5f969a0aa2e1e1dfa4a9adb5bcab9209d8f7f20da38a7756511b7ce9
-
Filesize
221B
MD59cb3f54fc8c894059a313dcefabd45f0
SHA1571f1a79666282c315f00e07cea0dd3f82d71a8b
SHA25655807307eed7ff3efe3af1d7686a181ee193d29cc3ca4e6b1499adbc76d674f6
SHA512552a51a35385aceea9c9110b4a505da2105e894f79a4b83509a2c95e182e3a670540e3f5389d5f907b08442171116a642a1c83db8e8fb9f5922a68526c7ffd18
-
Filesize
195B
MD5da2c82780ff01e78d9757e79bc465e02
SHA14ff18b4681c6ace5e9f3d4481e33b52fdace41c7
SHA2567adc567063c6748cbcabc815c3a1af9c17883e110ca9e60bcd83f8e910f6613f
SHA512c452d0c8f26514746664d1c54a8f563b2ae652e5c8e32c5b8c4c8f362ce0b652da8ca697548456d6cde98a27f65c4a847bea67bc77b00315a8ab89cbeca91148
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
132B
MD5a551020817ea14a1c8f1c3c5a9f18abb
SHA16ed9c83b76e99f96607c520f8764d5488887145d
SHA256f7fb411426c3f94dda6514421d22dccbdbb08cbb561a46de56caaedac68413c3
SHA51207ef9289abe00ed9a329a39d6a3cc9d0af44d0935a97c6b30d52be043ba098c844b6800345bb846914ab7dd0129dbd5e5b2ef39deabb02250da945a0c14f4cf4
-
Filesize
1.0MB
MD566c2b7fa484ad7dd36957add0b863d82
SHA1e29846c546393f7e363901bd9eea2ec8297a04db
SHA2564280c960699cfbee89d4f9f471ce2342656bfe358e4f92b2daa7687dc8a0aa94
SHA512fe1b0e115bf672e25a0f916dfee46f8797cb501d6e43c2e6e8b784b7c04c2b48876d68e03b8c2be698d25c72049b61e04ce594d59fa5c77e30cd77b838da7660
-
Filesize
1.0MB
MD54b469126d515767c896339a85bcf4576
SHA105353a024f1189e5ca02c91dbde13bd2575f3265
SHA2564fb01efc35601d7e8539a03c1081de0948ca5d76a7264e42f262506b189a702b
SHA512c5c24faf88f81d2598b667536242934db8a89a35fd5a1e6fdc1e9771dbb6eb69d078f70737c9dffe85a05b910e681dfb3442607de2ece87a27b90ba02087f726
-
Filesize
11B
MD52f24b9adc372308b0ef3e10a75d934eb
SHA1dd7f58fc96c1081b97628bf292c2743ce9895fa4
SHA256d191607323f6b576b75bb227df6a9c72dce3faf7a5f299224fc32c90bc94d5f8
SHA5125f3d5e9d5d539b08f50c87860686071f90a920853dc9de10c0d824ba5f9ffe4cbfbf6ae5a33c55d53e7264fc8334f81f7bd64b4b79519d1c8cce99efa9e56b4f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5b473f30b3fb81fd50b7954e239d2cd4f
SHA1352ec5cce50e88a7e4a35607c62635f6eebefe01
SHA256461efc1a5b925ae56efb399c58e83d53488269e161f4017042142c80b4f02e11
SHA5122a9e767c4f656b60e694505fdbe83c8daedc9364e7e9f903f392aa40292e7b8c657cbebc22681b9fccaa5c2260b837630b1d0149287d12dd8f64252eb8e42571
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD50f0f77ec13a5d2b31dd4fefb96a9fdda
SHA138580e7a7146540ecb03f9894f0596443f7925fe
SHA2563e2b9706748480a171f189a96f1e1adfb51e7ccc2fdcafa36e824b20e2409647
SHA51292e2c39c7e9272d0290cdf4423e4946f34716b452e325ec53bd4b31d2dbf7c2cf046f0b0555160c14c4902e3c831c8b1f161a9a7b3c2af1874afaf903d282d56
-
Filesize
878B
MD5f73d2a379a3ba3ff5a84ac7774efd347
SHA1746257d690af552ceed3b2f3390e844674a4cd5d
SHA25680e317b03c6563032f3fe9086dbb09504fac49b7d005c811d5ec849277e11c2b
SHA5122fb82733b85bb7bc90a20df823b0f1e4610a4829043ec33d7536ce7f5aa9bbd15cb67cb0796c412f59c8ab368ca32f7c39705e45926a4426b0a8dff216fa0d72
-
Filesize
92KB
MD55c27608411832c5b39ba04e33d53536c
SHA1f92f8b7439ce1de4c297046ed1d3ff9f20bc97af
SHA2560ac827c9e35cdaa492ddd435079415805dcc276352112b040bcd34ef122cf565
SHA5121fa25eabc08dff9ea25dfa7da310a677927c6344b76815696b0483f8860fa1469820ff15d88a78ed32f712d03003631d9aceaf9c9851de5dd40c1fc2a7bc1309