Analysis
-
max time kernel
166s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 19:21
Behavioral task
behavioral1
Sample
6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe
Resource
win7-20231020-en
General
-
Target
6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe
-
Size
121KB
-
MD5
029fec160be0b791fb4cf0c885362309
-
SHA1
fa34649f08abc83140aa1c6ba66969bcb8206b14
-
SHA256
6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3
-
SHA512
5cfdab6906b501255dfb1961845ee8da9ed0f52a3ffed4ed67a341a164417ed9e2092c140c14cd58a8c0d0a3c56b8188efc99fa2759e6dbd4caeaf7438ae5f99
-
SSDEEP
3072:l63GIUchJGTgfB/ta4u661a9srlWr+beV+A5gBcGO+CfSMTA1C:l63GASTywD6Vzr+m6J1C
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe:*:enabled:@shell32.dll,-1" 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe -
Executes dropped EXE 2 IoCs
pid Process 4856 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3Srv.exe 4792 DesktopLayer.exe -
resource yara_rule behavioral2/memory/4840-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0002000000022612-3.dat upx behavioral2/memory/4856-4-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/files/0x0002000000022612-5.dat upx behavioral2/memory/4856-8-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/files/0x0009000000022dd2-10.dat upx behavioral2/files/0x0009000000022dd2-12.dat upx behavioral2/memory/4792-14-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/4792-16-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/4840-26-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxCDA0.tmp 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3Srv.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31070014" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31070014" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{ADC6667E-8331-11EE-B196-525F9C36013F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31070014" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2192617197" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "406760986" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31070014" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2192617197" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2190898585" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2190898585" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4792 DesktopLayer.exe 4792 DesktopLayer.exe 4792 DesktopLayer.exe 4792 DesktopLayer.exe 4792 DesktopLayer.exe 4792 DesktopLayer.exe 4792 DesktopLayer.exe 4792 DesktopLayer.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe Token: SeTakeOwnershipPrivilege 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe Token: SeRestorePrivilege 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe Token: SeBackupPrivilege 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe Token: SeChangeNotifyPrivilege 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1192 iexplore.exe 1192 iexplore.exe 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4840 wrote to memory of 4856 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 86 PID 4840 wrote to memory of 4856 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 86 PID 4840 wrote to memory of 4856 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 86 PID 4840 wrote to memory of 616 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 5 PID 4840 wrote to memory of 616 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 5 PID 4840 wrote to memory of 616 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 5 PID 4840 wrote to memory of 616 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 5 PID 4840 wrote to memory of 616 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 5 PID 4840 wrote to memory of 616 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 5 PID 4840 wrote to memory of 676 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 3 PID 4840 wrote to memory of 676 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 3 PID 4840 wrote to memory of 676 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 3 PID 4840 wrote to memory of 676 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 3 PID 4840 wrote to memory of 676 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 3 PID 4840 wrote to memory of 676 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 3 PID 4840 wrote to memory of 780 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 13 PID 4840 wrote to memory of 780 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 13 PID 4840 wrote to memory of 780 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 13 PID 4840 wrote to memory of 780 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 13 PID 4840 wrote to memory of 780 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 13 PID 4840 wrote to memory of 780 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 13 PID 4840 wrote to memory of 788 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 12 PID 4840 wrote to memory of 788 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 12 PID 4840 wrote to memory of 788 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 12 PID 4840 wrote to memory of 788 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 12 PID 4840 wrote to memory of 788 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 12 PID 4840 wrote to memory of 788 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 12 PID 4840 wrote to memory of 804 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 11 PID 4840 wrote to memory of 804 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 11 PID 4840 wrote to memory of 804 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 11 PID 4840 wrote to memory of 804 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 11 PID 4840 wrote to memory of 804 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 11 PID 4840 wrote to memory of 804 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 11 PID 4840 wrote to memory of 908 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 10 PID 4840 wrote to memory of 908 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 10 PID 4840 wrote to memory of 908 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 10 PID 4840 wrote to memory of 908 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 10 PID 4840 wrote to memory of 908 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 10 PID 4840 wrote to memory of 908 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 10 PID 4840 wrote to memory of 956 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 9 PID 4840 wrote to memory of 956 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 9 PID 4840 wrote to memory of 956 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 9 PID 4840 wrote to memory of 956 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 9 PID 4840 wrote to memory of 956 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 9 PID 4840 wrote to memory of 956 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 9 PID 4840 wrote to memory of 380 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 8 PID 4840 wrote to memory of 380 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 8 PID 4840 wrote to memory of 380 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 8 PID 4840 wrote to memory of 380 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 8 PID 4840 wrote to memory of 380 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 8 PID 4840 wrote to memory of 380 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 8 PID 4840 wrote to memory of 520 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 85 PID 4840 wrote to memory of 520 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 85 PID 4840 wrote to memory of 520 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 85 PID 4840 wrote to memory of 520 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 85 PID 4840 wrote to memory of 520 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 85 PID 4840 wrote to memory of 520 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 85 PID 4840 wrote to memory of 704 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 84 PID 4840 wrote to memory of 704 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 84 PID 4840 wrote to memory of 704 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 84 PID 4840 wrote to memory of 704 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 84 PID 4840 wrote to memory of 704 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 84 PID 4840 wrote to memory of 704 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 84 PID 4840 wrote to memory of 1032 4840 6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe 83
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:676
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:380
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:788
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:908
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:804
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3948
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:432
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵PID:2212
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca2⤵PID:632
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:2720
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:916
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:2680
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4784
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4100
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:4032
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3884
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3728
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:3048
-
-
C:\Windows\system32\BackgroundTaskHost.exe"C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider2⤵PID:4448
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:780
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1180
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe2⤵PID:3488
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2948
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1280
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1240
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1588
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1456
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1424
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2068
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2148
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2616
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:2676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:4148
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:4980
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4836
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4768
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:4724
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4488
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe"C:\Users\Admin\AppData\Local\Temp\6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3.exe"1⤵
- Modifies firewall policy service
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3Srv.exeC:\Users\Admin\AppData\Local\Temp\6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3Srv.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4856 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4792 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1192 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1688
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3496
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3312
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3304
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2860
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2656
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2648
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2608
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2600
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2584
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2540
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2404
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2396
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2176
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1984
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1908
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1892
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1816
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1772
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1696
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1416
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1296
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1172
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1076
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1068
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1032
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:704
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD569dc6baf34bc7dc2197cfc6d15bc0a83
SHA1193e9f44ce7e10fff6691ae05eb0a7c391698b25
SHA25660b9314940039281b6bb2216330400cf2b12d2125326ba2e69f251fb049409b2
SHA512c430d975aafafe90e97942b6fb54084c9985e50454320a33ab3b458ff2eac6b6c907e14ae105be8b0926222cd3298b62356d81b796128e620406b33fffc6a40c
-
Filesize
84KB
MD569dc6baf34bc7dc2197cfc6d15bc0a83
SHA1193e9f44ce7e10fff6691ae05eb0a7c391698b25
SHA25660b9314940039281b6bb2216330400cf2b12d2125326ba2e69f251fb049409b2
SHA512c430d975aafafe90e97942b6fb54084c9985e50454320a33ab3b458ff2eac6b6c907e14ae105be8b0926222cd3298b62356d81b796128e620406b33fffc6a40c
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Temp\6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3Srv.exe
Filesize84KB
MD569dc6baf34bc7dc2197cfc6d15bc0a83
SHA1193e9f44ce7e10fff6691ae05eb0a7c391698b25
SHA25660b9314940039281b6bb2216330400cf2b12d2125326ba2e69f251fb049409b2
SHA512c430d975aafafe90e97942b6fb54084c9985e50454320a33ab3b458ff2eac6b6c907e14ae105be8b0926222cd3298b62356d81b796128e620406b33fffc6a40c
-
C:\Users\Admin\AppData\Local\Temp\6d736c8a7024a445451274682a6553da577da119f6bd25c444ecdff2c305e1c3Srv.exe
Filesize84KB
MD569dc6baf34bc7dc2197cfc6d15bc0a83
SHA1193e9f44ce7e10fff6691ae05eb0a7c391698b25
SHA25660b9314940039281b6bb2216330400cf2b12d2125326ba2e69f251fb049409b2
SHA512c430d975aafafe90e97942b6fb54084c9985e50454320a33ab3b458ff2eac6b6c907e14ae105be8b0926222cd3298b62356d81b796128e620406b33fffc6a40c