Analysis
-
max time kernel
119s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18-07-2023 20:53
Static task
static1
Behavioral task
behavioral1
Sample
AutoSetup.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
AutoSetup.exe
Resource
win10v2004-20230703-en
General
-
Target
AutoSetup.exe
-
Size
536KB
-
MD5
6d93a2baab5525576367509416853525
-
SHA1
4c2984403e224302de125ad81a011aff551fcce8
-
SHA256
3ce6c698fd08c3b2aef2e2698ffee9e596b3b33ed3b78095a4e0430f1a577c16
-
SHA512
2cefe0310dce1aeb2fe61d459c0f284ffe1bc87d64aa402d8e82e3b8ab15cb2b5ed71ee79eff80d753e2b4e6d3a8cef9c9c97c041937067dd6105096765aded2
-
SSDEEP
6144:QYEzHrx2LNt+AvAikMy9v76alBHLSaesSkiAvHXL9yxAYQhr5ohUBr6oxPXuXxCZ:amnvJkPvualtysrHXLCALoKfCcpHcg
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\W32Time\Parameters\ServiceDll = "C:\\Windows\\system32\\w32time.DLL" w32tm.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\w32time\Parameters\ServiceDll = "C:\\Windows\\system32\\w32time.DLL" w32tm.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 1064f1e1b9b9d901 iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000015e49348610e2a42ac63317e6e4271ae0000000002000000000010660000000100002000000045030d1fd5153cd546c8c96507d40019b33b9d6c061731a88b0c32c2cc356b1e000000000e8000000002000020000000009549e571aaee23c3b66857c88d6771c05bf1c3d216e0313d966c2f5b93b686900000008c331cd7a004893428aa97e524126d4d60af367de8cf0bf49fd8c75c7523b5d274d4bd7fa56248ec830859d296e41cd680905d269a0cc7039a6acf185cbca3b6b9dbdee3de1f5a4fe0c4bbea9532044e651017f1e63bb4974311fff49c1c2ba58ac56acddb7ed60518332cf9e39124b5ee432eabfdcff0ed7a8e95fe8344f6b53385653062af540fba76b182cad09a1a4000000049aa4aa9b090fb13a6c25a8b84e83ac4775f1cca764a3b8abe8eb64afcde519e6ed326bdcbae7e9019977cd6eedd5626de88d5b072816bdaaa82c2329c7b5166 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "396478569" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D6C2A71-25AD-11EE-BB71-6A17F358A96E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0cba2f7b9b9d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000015e49348610e2a42ac63317e6e4271ae000000000200000000001066000000010000200000007d4c1c7e6dfc992c855a25d3bb3b051089e0ca010180c5a4efe28155d568af75000000000e8000000002000020000000838f49bfe8e1fab719f093f4f9073e927ac7742137fbd9b0ea9ec8f8af53a5b12000000093c4b195a1454ef84c2747fcd7bab47867f056f9e5998f574918f126e07fc6d0400000004df3fd6089dee6b364ac8ae6593e1c3f8663033f79707ff406aaabaff8d5bde9fef8b8c86b7d389cf00489e3c0568e044bd8f1bb0af352532a6e836ae2ee9ad1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1620 WMIC.exe Token: SeSecurityPrivilege 1620 WMIC.exe Token: SeTakeOwnershipPrivilege 1620 WMIC.exe Token: SeLoadDriverPrivilege 1620 WMIC.exe Token: SeSystemProfilePrivilege 1620 WMIC.exe Token: SeSystemtimePrivilege 1620 WMIC.exe Token: SeProfSingleProcessPrivilege 1620 WMIC.exe Token: SeIncBasePriorityPrivilege 1620 WMIC.exe Token: SeCreatePagefilePrivilege 1620 WMIC.exe Token: SeBackupPrivilege 1620 WMIC.exe Token: SeRestorePrivilege 1620 WMIC.exe Token: SeShutdownPrivilege 1620 WMIC.exe Token: SeDebugPrivilege 1620 WMIC.exe Token: SeSystemEnvironmentPrivilege 1620 WMIC.exe Token: SeRemoteShutdownPrivilege 1620 WMIC.exe Token: SeUndockPrivilege 1620 WMIC.exe Token: SeManageVolumePrivilege 1620 WMIC.exe Token: 33 1620 WMIC.exe Token: 34 1620 WMIC.exe Token: 35 1620 WMIC.exe Token: SeIncreaseQuotaPrivilege 1620 WMIC.exe Token: SeSecurityPrivilege 1620 WMIC.exe Token: SeTakeOwnershipPrivilege 1620 WMIC.exe Token: SeLoadDriverPrivilege 1620 WMIC.exe Token: SeSystemProfilePrivilege 1620 WMIC.exe Token: SeSystemtimePrivilege 1620 WMIC.exe Token: SeProfSingleProcessPrivilege 1620 WMIC.exe Token: SeIncBasePriorityPrivilege 1620 WMIC.exe Token: SeCreatePagefilePrivilege 1620 WMIC.exe Token: SeBackupPrivilege 1620 WMIC.exe Token: SeRestorePrivilege 1620 WMIC.exe Token: SeShutdownPrivilege 1620 WMIC.exe Token: SeDebugPrivilege 1620 WMIC.exe Token: SeSystemEnvironmentPrivilege 1620 WMIC.exe Token: SeRemoteShutdownPrivilege 1620 WMIC.exe Token: SeUndockPrivilege 1620 WMIC.exe Token: SeManageVolumePrivilege 1620 WMIC.exe Token: 33 1620 WMIC.exe Token: 34 1620 WMIC.exe Token: 35 1620 WMIC.exe Token: SeIncreaseQuotaPrivilege 2820 WMIC.exe Token: SeSecurityPrivilege 2820 WMIC.exe Token: SeTakeOwnershipPrivilege 2820 WMIC.exe Token: SeLoadDriverPrivilege 2820 WMIC.exe Token: SeSystemProfilePrivilege 2820 WMIC.exe Token: SeSystemtimePrivilege 2820 WMIC.exe Token: SeProfSingleProcessPrivilege 2820 WMIC.exe Token: SeIncBasePriorityPrivilege 2820 WMIC.exe Token: SeCreatePagefilePrivilege 2820 WMIC.exe Token: SeBackupPrivilege 2820 WMIC.exe Token: SeRestorePrivilege 2820 WMIC.exe Token: SeShutdownPrivilege 2820 WMIC.exe Token: SeDebugPrivilege 2820 WMIC.exe Token: SeSystemEnvironmentPrivilege 2820 WMIC.exe Token: SeRemoteShutdownPrivilege 2820 WMIC.exe Token: SeUndockPrivilege 2820 WMIC.exe Token: SeManageVolumePrivilege 2820 WMIC.exe Token: 33 2820 WMIC.exe Token: 34 2820 WMIC.exe Token: 35 2820 WMIC.exe Token: SeIncreaseQuotaPrivilege 2820 WMIC.exe Token: SeSecurityPrivilege 2820 WMIC.exe Token: SeTakeOwnershipPrivilege 2820 WMIC.exe Token: SeLoadDriverPrivilege 2820 WMIC.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2508 iexplore.exe 2508 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2508 iexplore.exe 2508 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2508 iexplore.exe 2508 iexplore.exe 284 IEXPLORE.EXE 284 IEXPLORE.EXE 284 IEXPLORE.EXE 284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2636 2040 AutoSetup.exe 29 PID 2040 wrote to memory of 2636 2040 AutoSetup.exe 29 PID 2040 wrote to memory of 2636 2040 AutoSetup.exe 29 PID 2636 wrote to memory of 2508 2636 cmd.exe 30 PID 2636 wrote to memory of 2508 2636 cmd.exe 30 PID 2636 wrote to memory of 2508 2636 cmd.exe 30 PID 2040 wrote to memory of 1908 2040 AutoSetup.exe 31 PID 2040 wrote to memory of 1908 2040 AutoSetup.exe 31 PID 2040 wrote to memory of 1908 2040 AutoSetup.exe 31 PID 1908 wrote to memory of 1620 1908 cmd.exe 32 PID 1908 wrote to memory of 1620 1908 cmd.exe 32 PID 1908 wrote to memory of 1620 1908 cmd.exe 32 PID 2508 wrote to memory of 2924 2508 iexplore.exe 33 PID 2508 wrote to memory of 2924 2508 iexplore.exe 33 PID 2508 wrote to memory of 2924 2508 iexplore.exe 33 PID 2508 wrote to memory of 2924 2508 iexplore.exe 33 PID 2040 wrote to memory of 2848 2040 AutoSetup.exe 34 PID 2040 wrote to memory of 2848 2040 AutoSetup.exe 34 PID 2040 wrote to memory of 2848 2040 AutoSetup.exe 34 PID 2848 wrote to memory of 2820 2848 cmd.exe 35 PID 2848 wrote to memory of 2820 2848 cmd.exe 35 PID 2848 wrote to memory of 2820 2848 cmd.exe 35 PID 2040 wrote to memory of 684 2040 AutoSetup.exe 38 PID 2040 wrote to memory of 684 2040 AutoSetup.exe 38 PID 2040 wrote to memory of 684 2040 AutoSetup.exe 38 PID 684 wrote to memory of 2624 684 cmd.exe 39 PID 684 wrote to memory of 2624 684 cmd.exe 39 PID 684 wrote to memory of 2624 684 cmd.exe 39 PID 2040 wrote to memory of 1280 2040 AutoSetup.exe 40 PID 2040 wrote to memory of 1280 2040 AutoSetup.exe 40 PID 2040 wrote to memory of 1280 2040 AutoSetup.exe 40 PID 2508 wrote to memory of 284 2508 iexplore.exe 41 PID 2508 wrote to memory of 284 2508 iexplore.exe 41 PID 2508 wrote to memory of 284 2508 iexplore.exe 41 PID 2508 wrote to memory of 284 2508 iexplore.exe 41 PID 1280 wrote to memory of 752 1280 cmd.exe 42 PID 1280 wrote to memory of 752 1280 cmd.exe 42 PID 1280 wrote to memory of 752 1280 cmd.exe 42 PID 2040 wrote to memory of 2556 2040 AutoSetup.exe 43 PID 2040 wrote to memory of 2556 2040 AutoSetup.exe 43 PID 2040 wrote to memory of 2556 2040 AutoSetup.exe 43 PID 2556 wrote to memory of 2540 2556 cmd.exe 44 PID 2556 wrote to memory of 2540 2556 cmd.exe 44 PID 2556 wrote to memory of 2540 2556 cmd.exe 44 PID 2540 wrote to memory of 1432 2540 net.exe 45 PID 2540 wrote to memory of 1432 2540 net.exe 45 PID 2540 wrote to memory of 1432 2540 net.exe 45 PID 2040 wrote to memory of 276 2040 AutoSetup.exe 46 PID 2040 wrote to memory of 276 2040 AutoSetup.exe 46 PID 2040 wrote to memory of 276 2040 AutoSetup.exe 46 PID 276 wrote to memory of 1756 276 cmd.exe 47 PID 276 wrote to memory of 1756 276 cmd.exe 47 PID 276 wrote to memory of 1756 276 cmd.exe 47 PID 2040 wrote to memory of 1700 2040 AutoSetup.exe 48 PID 2040 wrote to memory of 1700 2040 AutoSetup.exe 48 PID 2040 wrote to memory of 1700 2040 AutoSetup.exe 48 PID 1700 wrote to memory of 880 1700 cmd.exe 49 PID 1700 wrote to memory of 880 1700 cmd.exe 49 PID 1700 wrote to memory of 880 1700 cmd.exe 49 PID 2040 wrote to memory of 2164 2040 AutoSetup.exe 50 PID 2040 wrote to memory of 2164 2040 AutoSetup.exe 50 PID 2040 wrote to memory of 2164 2040 AutoSetup.exe 50 PID 2164 wrote to memory of 2108 2164 cmd.exe 51 PID 2164 wrote to memory of 2108 2164 cmd.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\AutoSetup.exe"C:\Users\Admin\AppData\Local\Temp\AutoSetup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start https://www.sordum.org/files/downloads.php?st-defender-control 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.sordum.org/files/downloads.php?st-defender-control3⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2508 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2508 CREDAT:275465 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:284
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List2⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c WMIC CPU Get VirtualizationFirmwareEnabled2⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\System32\Wbem\WMIC.exeWMIC CPU Get VirtualizationFirmwareEnabled3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start https://aka.ms/vs/17/release/vc_redist.x64.exe 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/vs/17/release/vc_redist.x64.exe3⤵PID:2624
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c w32tm /register 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\system32\w32tm.exew32tm /register3⤵
- Sets DLL path for service in the registry
PID:752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net stop w32time 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\system32\net.exenet stop w32time3⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop w32time4⤵PID:1432
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c w32tm /unregister 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Windows\system32\w32tm.exew32tm /unregister3⤵PID:1756
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c w32tm /register 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\system32\w32tm.exew32tm /register3⤵
- Sets DLL path for service in the registry
PID:880
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net start w32time 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\system32\net.exenet start w32time3⤵PID:2108
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start w32time4⤵PID:1908
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c w32tm /resync 2>nul2⤵PID:2984
-
C:\Windows\system32\w32tm.exew32tm /resync3⤵PID:2008
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic os get version | findstr /R "[0-9]\.[0-9]\.[0-9]"2⤵PID:632
-
C:\Windows\System32\Wbem\WMIC.exewmic os get version3⤵PID:700
-
-
C:\Windows\system32\findstr.exefindstr /R "[0-9]\.[0-9]\.[0-9]"3⤵PID:1920
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a778ad21bb94aa9cbfb7ae19b72af00
SHA1c620a1da9950a30ccef96f441e0124d5d2d39bf1
SHA2563055a2574e0042cb4a29f50ad808663756a7039d4581d0eb8ed4051796862487
SHA5121df9586a0fde9db1902045a71c41514635e83817c5e62ecd3b0000fa68271e49a0ca9b57617d7bfa99dfe146c54de9299662cc6ad603fd67e2881719c9007d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504d4323b1d198e50d0b99d76d3f35dfd
SHA15b159425508bbf7e669191c9f9ae78fa12615377
SHA256214e0dcd42991ed216438bdd823273a7191ae7f5c958a5629f2e8658c305d00d
SHA512461d1b34d200301c00ab5959df0bcb2a7ecf252fd1a5ecc6dbd51e29321081f466af54a13d1755e6c803b3aa57008fc6ca1be452060015635e2dec5235cef38f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5430159f21643343d0bb09ebe9354fbbf
SHA158c82e1a59089f1083e60244a8ea961ee191f849
SHA25627e676588e2e828efe4b1879204d14902ea9cb2268da81d260da816a4c5bcbd0
SHA512da083575b3a0ebcd660fba2ea5a056b614526b3799aadf01d01dfae48d5da210aa75e455d02709a33b5120c7751e05b462b801a7ca5f15440087e2a9d49f48d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3c56371d1971edc7463d33208eebf1f
SHA1c3776a24c3e16aa28124015c15455a8859006305
SHA25603c21f2c623eeb5eebcae2bb5f3ae623a6a98990948326d48231a4f4f6334dce
SHA5125d6226c1cd533e07773fe29ba651cb6c517c55929eb8a6ecb1354c76fc7e29c7734cc388f744eb520227d30a83b23d4019f36d9fb7fe225b2fa527a47d2d857a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e2be833b924cbf50c6088abc3595703
SHA11e3a2af13b61442db270c2cb9e89236d4ab9a2e9
SHA2560b32485d93ce2e86212d28a6f26c56c7e16aa2572897a62f3f5a76c90ddb929e
SHA51286e98cc25dd5c872e0fbcddbaf8c015ccb24503c0b0901255996d92f656c09a71650737ba20d89d4ff72d7295578d5893d15d36ad002a12b136c6726d521a327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57db8a9068416c3398db14427c02c13cd
SHA13baa1e0e1c484d52fc15c14751afa94c10819da0
SHA2561eb73ca42c4a3e59d78196af230cb47205df21d650ccabdffec3dbe600af71df
SHA512f61d88121e9c1b5f3a31e603f096cfe916e451e2563ec13342d3d9f6c206a7bfa2c04283e11c91d30068536ff5318b598e1ba24e175c630ef5e9f35151b49d72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee476fd65e68f29ef9a26f0db293598c
SHA17793e24f5c0c766c8cbf2b5431e57b6cacd1cb6e
SHA256144518cac8676c56c50b11932bbef9b4c0ebda12441c66c197ea7f287392e779
SHA5120378abf1e096d1c6e958c7fb3081da20140930b9a1150e9eab9bd068e7600e179ff172f0b5a540605d31714deb3ea2a13c03024e5c6acf1381296df7d61cee0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bc9acc37159acc6e848c4ac2ea9eab1
SHA188d7d950bdb0d6f0a0f5ed3549903a6961b59deb
SHA256f1f15c8e34b206bbe32bc1e00165d0ca4a7ccf948eeb6ac4c981c967f78d513e
SHA512e2b76ed99109c406ef84ab79cc2cf030c82d4e95429228980e2f56904c8b3e1db30b8ac399eaa72874f34eb218c80ec0a9e9ef12740425ac5e9d0530aaa27aba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd6ba3ddfccdfa9e40f0bfcf19331d66
SHA1517e20da36d4c7e6cf966fb5acbba4d590b5d0f3
SHA2560bf83bae82431cb9861d5a6b050d8f2925dd4b097b165827c8fe1d8301ba6dc9
SHA5120fd47de5b648abe2cbc5f2549c973f315af01ea3e725ef77468109e6c1a63eb64e45558adee07f0386f852dfc9e9657d21e17e126d3e935c7e759f8ad0a0f50c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e96b78fdf75670ed272988c3a6233679
SHA1f9142cc11cce1d1f0ec298724ecde2050dde3473
SHA256dba860890fc6743ff009f7bccb1d749db70c383a930ac8d6e7feda48154cb7a6
SHA512396cfc4f827f14830d1f85aa7181a664071cb36be5804f83fe6db1928acc16b1a34f173f2f88bbb7b23387bf4a0e2b84d2c2a747bf4995a08dbf0e5e0fbac570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588400c0a32313b1e81211eb2f0ecfcb7
SHA1851046bf77dee532f41512ee12a33849f03a6d8f
SHA256c16b2ed3f36b062c053ec724acbbf67932af3fd5ca156ac70b7b2bae53cdb2be
SHA51262c43c769bf95a1359cf4150d66c8e9eaf1949d69d07d0032a7a534a332dd1e1a6fecf73d718f88bd075f5065067f9d652ddbf286a1ed8f1a69246d005435fe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f7198f8cc477f586bcecba5154f0923
SHA1fcb50f5450be8b81c1fa1c926d8bf43b3f531c6d
SHA256c511b9c37d7618b3dbb6fed480d39a066a0394e55fdacd32d4a104eca34ab449
SHA512e31a74c4e1fbc6cedcd7e16c9066c6f4c345edf32514121f8a56c814386b678e9499accd69f07f6f2c24cd0ac0ce797b2fe862910a6a06d9115f16ad2ae5a960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7c522085f963facf97656e94cbdfceb
SHA1a2828a649f69306184f0f08464555d86b3477517
SHA25687f77488d2395822307b6d0849f865f87cf0f4133d9afbd836ee150955cb24eb
SHA51270ab35f5b6b4184f6becf8b9c01b61b04f89a413d3263a45bca46bf6bfcd7f7860ac55aa7258b2152a8d9ee50dbc2e99938891cafc7b948ecd71d982442729d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e984c1ed997f5d049b35a594ddc7c51
SHA13b3b6cb9b7b8a3c0c7c161a6e360c874450adaa2
SHA2567dc4c55e52ff44aaba73d11d37d22b09ef94e77665f6dac12e0acdf4c42ae5ed
SHA51236c812860d4334120f2d61603458532d9e912e7efe3bdf290b9323bcfce0a49eadd9b57f6b0f2f1c22be178a1847174e725d87dd714a8f85392df412a7673a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5761afcdfb83a616229d0123d9f559aa2
SHA11b9596b1d4fa5ac2f9d74890fe6c93cfa7aa6b2c
SHA25696cd4a6cd19c2ff5aeec85cd0f6767f0cc64d91bad256e8faef6b9ca9a54b47b
SHA51200b5340906eee52e32b278f6821c74799920caf59b24ed9d97627bb78928f96f958fe051f5abdd8b6fea44ebbf43f266505701f8e371aeedd3aa32717a3621ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b673f33c59edbd5dc074970904ad841
SHA1e29b80f23546bf351066e1f910240dde49976719
SHA2565e9be7cf60c94090d97a5855e22b560b7d5a9f9306451cdcd1fdd16a28a202ba
SHA512656d9dae66ba2be025ade8975f4695800eb9594b22bac624f2e6681209809dbfdd5753f648aefd78727da7165dca8d47026392e607a5b0cc923fa592f5dd47e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5914ddba5a3942eecce536b696b6706
SHA1234d745cfa323b36516cff605a53e94cc68bc464
SHA2560b25eb72e942ed8be90019f93a1ff11da282d29bfcb529809cb1d4376a802cad
SHA5124e12c3ec614cca7a62d293aae9e247c462e88bbbf6d8fbd3424a7dd0b1ce611ce492aff04f07e78fa6bf4f5c563d399801a0fb8132ceb7958ce15a06a2e5ec3d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LJMXAU3H\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
603B
MD558f653f4ff30117002abf356c9aff71d
SHA1beb39bae7a6cf34ad9b64ad3f45b21e0528feb29
SHA25681368c15148c3125f4e769c95a2bb7fdc20afa65e8aad1397f6c0b8c0d5eefd8
SHA51283d321127d2d74e5b70a71c84a677e2e9b42bf2d7854be3fd26f4e3110f60472f8e1ca7a124cd8740af04b3bc9c3df97cce8b95a5d1d37d9542fc6351a9b80e4