Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
13/11/2023, 23:48
Behavioral task
behavioral1
Sample
20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe
Resource
win10v2004-20231023-en
General
-
Target
20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe
-
Size
4.7MB
-
MD5
13915da610f93292cfa38afe536eb0a2
-
SHA1
9d396a81a91c9077cb68f1053e853131fc51a289
-
SHA256
20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad
-
SHA512
d6ee50e4f06aa8b8d8333424cf413ef7ce64f3717d7d116fe2f2835d6c3bc1676c6b2bc01c513b134196ec7f1f3980acbcb25b1137e9062fca9327f978ccaf1f
-
SSDEEP
98304:abonGQFI38Ox3r2Xa/t9IGi6tb2swtHNfJkOAshs9Jqt2b9aanr:a6GQG38O9DWC2nfJvbeqtsUa
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 1964 szcj.exe 2004 x64.exe 1544 szcj.exe -
Loads dropped DLL 3 IoCs
pid Process 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 1964 szcj.exe 1904 Process not Found -
resource yara_rule behavioral1/memory/2228-0-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2228-1-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2228-2-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-3-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2228-4-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-5-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-7-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-9-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-11-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-13-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-15-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-17-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-20-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-23-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-25-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-28-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-31-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-33-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-37-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-39-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-41-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-35-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-43-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-45-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-47-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-49-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-50-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2228-59-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-60-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-64-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2856-65-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2856-66-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-68-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2856-70-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2856-72-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2856-74-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2856-76-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2856-78-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2856-80-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2856-82-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2856-107-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-108-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2856-122-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-123-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-131-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-133-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-134-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-139-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-140-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-141-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-142-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-147-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-148-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-151-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-156-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-157-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-158-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-159-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-160-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-161-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-162-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-163-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-172-0x0000000000400000-0x0000000000E07000-memory.dmp upx behavioral1/memory/2856-189-0x0000000000400000-0x0000000000E07000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 1964 szcj.exe 1964 szcj.exe 1964 szcj.exe 1964 szcj.exe 1964 szcj.exe 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 2004 x64.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe 1544 szcj.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: 1 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeCreateTokenPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeAssignPrimaryTokenPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeLockMemoryPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeIncreaseQuotaPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeMachineAccountPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeTcbPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeSecurityPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeTakeOwnershipPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeLoadDriverPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeSystemProfilePrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeSystemtimePrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeProfSingleProcessPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeIncBasePriorityPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeCreatePagefilePrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeCreatePermanentPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeBackupPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeRestorePrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeShutdownPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeDebugPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeAuditPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeSystemEnvironmentPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeChangeNotifyPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeRemoteShutdownPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeUndockPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeSyncAgentPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeEnableDelegationPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeManageVolumePrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeImpersonatePrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeCreateGlobalPrivilege 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: 31 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: 32 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: 33 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: 34 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: 35 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: 36 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: 37 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: 38 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: 39 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: 40 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: 41 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: 42 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: 43 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: 44 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: 45 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: 46 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: 47 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: 48 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeDebugPrivilege 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: 1 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeCreateTokenPrivilege 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeAssignPrimaryTokenPrivilege 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeLockMemoryPrivilege 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeIncreaseQuotaPrivilege 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeMachineAccountPrivilege 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeTcbPrivilege 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeSecurityPrivilege 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeTakeOwnershipPrivilege 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeLoadDriverPrivilege 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeSystemProfilePrivilege 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeSystemtimePrivilege 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeProfSingleProcessPrivilege 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe Token: SeIncBasePriorityPrivilege 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 1964 szcj.exe 1964 szcj.exe 1544 szcj.exe 1544 szcj.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2856 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 28 PID 2228 wrote to memory of 2856 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 28 PID 2228 wrote to memory of 2856 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 28 PID 2228 wrote to memory of 2856 2228 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 28 PID 2856 wrote to memory of 1964 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 33 PID 2856 wrote to memory of 1964 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 33 PID 2856 wrote to memory of 1964 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 33 PID 2856 wrote to memory of 1964 2856 20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe 33 PID 1964 wrote to memory of 2004 1964 szcj.exe 35 PID 1964 wrote to memory of 2004 1964 szcj.exe 35 PID 1964 wrote to memory of 2004 1964 szcj.exe 35 PID 1964 wrote to memory of 2004 1964 szcj.exe 35 PID 2004 wrote to memory of 424 2004 x64.exe 3 PID 2004 wrote to memory of 424 2004 x64.exe 3 PID 2004 wrote to memory of 424 2004 x64.exe 3 PID 2004 wrote to memory of 424 2004 x64.exe 3 PID 424 wrote to memory of 1544 424 winlogon.exe 36 PID 424 wrote to memory of 1544 424 winlogon.exe 36 PID 424 wrote to memory of 1544 424 winlogon.exe 36 PID 424 wrote to memory of 1544 424 winlogon.exe 36
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Users\Admin\AppData\Local\Temp\szcj.exeC:\Users\Admin\AppData\Local\Temp\szcj.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe"C:\Users\Admin\AppData\Local\Temp\20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe"C:\Users\Admin\AppData\Local\Temp\20e8e5674d2beef05f0cfdf0b50b0c6355a00c16fd1618e534daa85f1df9c9ad.exe"2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\szcj.exe"C:\Users\Admin\AppData\Local\Temp\szcj.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\x64.exeC:\Users\Admin\AppData\Local\Temp\x64.exe "C:\Users\Admin\AppData\Local\Temp\szcj.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5ab0b36e41a99f654069181d5bd17732f
SHA1e18cfb9085f471ffa03fe411773fc234c6522c23
SHA25607f3e7f9daf1f4e1abe05393ed66caa866cc5e9464fb98f4c8ef7351b9433418
SHA5122d481ff40dcc29474fea36f7718b3c8ce38807ac2c26fff608502cba8abbaf5940d6b60551b5fe90ee0407123a632b7d57208769188bdd13aa403b6449e58f3c
-
Filesize
3.1MB
MD5ab0b36e41a99f654069181d5bd17732f
SHA1e18cfb9085f471ffa03fe411773fc234c6522c23
SHA25607f3e7f9daf1f4e1abe05393ed66caa866cc5e9464fb98f4c8ef7351b9433418
SHA5122d481ff40dcc29474fea36f7718b3c8ce38807ac2c26fff608502cba8abbaf5940d6b60551b5fe90ee0407123a632b7d57208769188bdd13aa403b6449e58f3c
-
Filesize
3.1MB
MD5ab0b36e41a99f654069181d5bd17732f
SHA1e18cfb9085f471ffa03fe411773fc234c6522c23
SHA25607f3e7f9daf1f4e1abe05393ed66caa866cc5e9464fb98f4c8ef7351b9433418
SHA5122d481ff40dcc29474fea36f7718b3c8ce38807ac2c26fff608502cba8abbaf5940d6b60551b5fe90ee0407123a632b7d57208769188bdd13aa403b6449e58f3c
-
Filesize
16KB
MD52c938bf20d360971bae15b57e27d86d8
SHA1772398deb3d1b2df3e435cc09096a076fefbc75a
SHA25612aff77ff794ebc5c0d4de2db60c5196ff9c833be7ae28cb71d10713eaf0ae57
SHA512d74550d4915900c3438cb7d5fe161237647638350f961fca23d812eededbb5fc2bb91543bd680c2af8c074ff64fc8015eed49c5774eb520cfcdca5a5303ea629
-
Filesize
3.1MB
MD5ab0b36e41a99f654069181d5bd17732f
SHA1e18cfb9085f471ffa03fe411773fc234c6522c23
SHA25607f3e7f9daf1f4e1abe05393ed66caa866cc5e9464fb98f4c8ef7351b9433418
SHA5122d481ff40dcc29474fea36f7718b3c8ce38807ac2c26fff608502cba8abbaf5940d6b60551b5fe90ee0407123a632b7d57208769188bdd13aa403b6449e58f3c
-
Filesize
16KB
MD52c938bf20d360971bae15b57e27d86d8
SHA1772398deb3d1b2df3e435cc09096a076fefbc75a
SHA25612aff77ff794ebc5c0d4de2db60c5196ff9c833be7ae28cb71d10713eaf0ae57
SHA512d74550d4915900c3438cb7d5fe161237647638350f961fca23d812eededbb5fc2bb91543bd680c2af8c074ff64fc8015eed49c5774eb520cfcdca5a5303ea629
-
Filesize
16KB
MD52c938bf20d360971bae15b57e27d86d8
SHA1772398deb3d1b2df3e435cc09096a076fefbc75a
SHA25612aff77ff794ebc5c0d4de2db60c5196ff9c833be7ae28cb71d10713eaf0ae57
SHA512d74550d4915900c3438cb7d5fe161237647638350f961fca23d812eededbb5fc2bb91543bd680c2af8c074ff64fc8015eed49c5774eb520cfcdca5a5303ea629