Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 19:11
Static task
static1
Behavioral task
behavioral1
Sample
36f426936db645690496fdee469c34a1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36f426936db645690496fdee469c34a1.exe
Resource
win10v2004-20231215-en
General
-
Target
36f426936db645690496fdee469c34a1.exe
-
Size
965KB
-
MD5
36f426936db645690496fdee469c34a1
-
SHA1
f5ccf81f0f837fbbe45c42ab8f3e8be94d9f559c
-
SHA256
36b6bd45b1e1ba82e988d14163dae843854ecbee141fb2815260f6443340cc9b
-
SHA512
1b0311411e82044b9a6fab0e11b45041be4914dcc18f2223ad0e503c5f2ba10170736872ce6cc857df5ebfb999b28e25a2fabd923e24aeb6e6b09dcdf171acbc
-
SSDEEP
12288:ypqiC/2OGAtkCP4cejGSOpRKwCGYjLGis:ypo/2+ttPJLfpRKwCGYf
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe system3_.exe" 36f426936db645690496fdee469c34a1.exe -
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 36f426936db645690496fdee469c34a1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\36f426936db645690496fdee469c34a1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\36f426936db645690496fdee469c34a1.exe:*:enabled:@shell32.dll,-1" 36f426936db645690496fdee469c34a1.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 36f426936db645690496fdee469c34a1.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 36f426936db645690496fdee469c34a1.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 36f426936db645690496fdee469c34a1.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Users\\Admin\\Desktop\\system3_.exe" 36f426936db645690496fdee469c34a1.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4920-0-0x0000000000400000-0x0000000000509000-memory.dmp autoit_exe behavioral2/files/0x00090000000231fb-10.dat autoit_exe behavioral2/memory/4920-16-0x0000000000400000-0x0000000000509000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3040 4920 WerFault.exe 14 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main 36f426936db645690496fdee469c34a1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main 36f426936db645690496fdee469c34a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.advgoogle.blogdpot.com" 36f426936db645690496fdee469c34a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://www.advgoogle.blogdpot.com" 36f426936db645690496fdee469c34a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Search Page = "http://www.advgoogle.blogdpot.com" 36f426936db645690496fdee469c34a1.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://www.advgoogle.blogdpot.com" 36f426936db645690496fdee469c34a1.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.advgoogle.blogdpot.com" 36f426936db645690496fdee469c34a1.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe 4920 36f426936db645690496fdee469c34a1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4920 36f426936db645690496fdee469c34a1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4920 wrote to memory of 620 4920 36f426936db645690496fdee469c34a1.exe 92 PID 4920 wrote to memory of 620 4920 36f426936db645690496fdee469c34a1.exe 92 PID 4920 wrote to memory of 620 4920 36f426936db645690496fdee469c34a1.exe 92 PID 4920 wrote to memory of 620 4920 36f426936db645690496fdee469c34a1.exe 92 PID 4920 wrote to memory of 620 4920 36f426936db645690496fdee469c34a1.exe 92 PID 4920 wrote to memory of 620 4920 36f426936db645690496fdee469c34a1.exe 92 PID 4920 wrote to memory of 680 4920 36f426936db645690496fdee469c34a1.exe 2 PID 4920 wrote to memory of 680 4920 36f426936db645690496fdee469c34a1.exe 2 PID 4920 wrote to memory of 680 4920 36f426936db645690496fdee469c34a1.exe 2 PID 4920 wrote to memory of 680 4920 36f426936db645690496fdee469c34a1.exe 2 PID 4920 wrote to memory of 680 4920 36f426936db645690496fdee469c34a1.exe 2 PID 4920 wrote to memory of 680 4920 36f426936db645690496fdee469c34a1.exe 2 PID 4920 wrote to memory of 756 4920 36f426936db645690496fdee469c34a1.exe 3 PID 4920 wrote to memory of 756 4920 36f426936db645690496fdee469c34a1.exe 3 PID 4920 wrote to memory of 756 4920 36f426936db645690496fdee469c34a1.exe 3 PID 4920 wrote to memory of 756 4920 36f426936db645690496fdee469c34a1.exe 3 PID 4920 wrote to memory of 756 4920 36f426936db645690496fdee469c34a1.exe 3 PID 4920 wrote to memory of 756 4920 36f426936db645690496fdee469c34a1.exe 3 PID 4920 wrote to memory of 764 4920 36f426936db645690496fdee469c34a1.exe 90 PID 4920 wrote to memory of 764 4920 36f426936db645690496fdee469c34a1.exe 90 PID 4920 wrote to memory of 764 4920 36f426936db645690496fdee469c34a1.exe 90 PID 4920 wrote to memory of 764 4920 36f426936db645690496fdee469c34a1.exe 90 PID 4920 wrote to memory of 764 4920 36f426936db645690496fdee469c34a1.exe 90 PID 4920 wrote to memory of 764 4920 36f426936db645690496fdee469c34a1.exe 90 PID 4920 wrote to memory of 788 4920 36f426936db645690496fdee469c34a1.exe 89 PID 4920 wrote to memory of 788 4920 36f426936db645690496fdee469c34a1.exe 89 PID 4920 wrote to memory of 788 4920 36f426936db645690496fdee469c34a1.exe 89 PID 4920 wrote to memory of 788 4920 36f426936db645690496fdee469c34a1.exe 89 PID 4920 wrote to memory of 788 4920 36f426936db645690496fdee469c34a1.exe 89 PID 4920 wrote to memory of 788 4920 36f426936db645690496fdee469c34a1.exe 89 PID 4920 wrote to memory of 888 4920 36f426936db645690496fdee469c34a1.exe 88 PID 4920 wrote to memory of 888 4920 36f426936db645690496fdee469c34a1.exe 88 PID 4920 wrote to memory of 888 4920 36f426936db645690496fdee469c34a1.exe 88 PID 4920 wrote to memory of 888 4920 36f426936db645690496fdee469c34a1.exe 88 PID 4920 wrote to memory of 888 4920 36f426936db645690496fdee469c34a1.exe 88 PID 4920 wrote to memory of 888 4920 36f426936db645690496fdee469c34a1.exe 88 PID 4920 wrote to memory of 944 4920 36f426936db645690496fdee469c34a1.exe 87 PID 4920 wrote to memory of 944 4920 36f426936db645690496fdee469c34a1.exe 87 PID 4920 wrote to memory of 944 4920 36f426936db645690496fdee469c34a1.exe 87 PID 4920 wrote to memory of 944 4920 36f426936db645690496fdee469c34a1.exe 87 PID 4920 wrote to memory of 944 4920 36f426936db645690496fdee469c34a1.exe 87 PID 4920 wrote to memory of 944 4920 36f426936db645690496fdee469c34a1.exe 87 PID 4920 wrote to memory of 316 4920 36f426936db645690496fdee469c34a1.exe 4 PID 4920 wrote to memory of 316 4920 36f426936db645690496fdee469c34a1.exe 4 PID 4920 wrote to memory of 316 4920 36f426936db645690496fdee469c34a1.exe 4 PID 4920 wrote to memory of 316 4920 36f426936db645690496fdee469c34a1.exe 4 PID 4920 wrote to memory of 316 4920 36f426936db645690496fdee469c34a1.exe 4 PID 4920 wrote to memory of 316 4920 36f426936db645690496fdee469c34a1.exe 4 PID 4920 wrote to memory of 512 4920 36f426936db645690496fdee469c34a1.exe 86 PID 4920 wrote to memory of 512 4920 36f426936db645690496fdee469c34a1.exe 86 PID 4920 wrote to memory of 512 4920 36f426936db645690496fdee469c34a1.exe 86 PID 4920 wrote to memory of 512 4920 36f426936db645690496fdee469c34a1.exe 86 PID 4920 wrote to memory of 512 4920 36f426936db645690496fdee469c34a1.exe 86 PID 4920 wrote to memory of 512 4920 36f426936db645690496fdee469c34a1.exe 86 PID 4920 wrote to memory of 412 4920 36f426936db645690496fdee469c34a1.exe 5 PID 4920 wrote to memory of 412 4920 36f426936db645690496fdee469c34a1.exe 5 PID 4920 wrote to memory of 412 4920 36f426936db645690496fdee469c34a1.exe 5 PID 4920 wrote to memory of 412 4920 36f426936db645690496fdee469c34a1.exe 5 PID 4920 wrote to memory of 412 4920 36f426936db645690496fdee469c34a1.exe 5 PID 4920 wrote to memory of 412 4920 36f426936db645690496fdee469c34a1.exe 5 PID 4920 wrote to memory of 856 4920 36f426936db645690496fdee469c34a1.exe 85 PID 4920 wrote to memory of 856 4920 36f426936db645690496fdee469c34a1.exe 85 PID 4920 wrote to memory of 856 4920 36f426936db645690496fdee469c34a1.exe 85 PID 4920 wrote to memory of 856 4920 36f426936db645690496fdee469c34a1.exe 85
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:680
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:756
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:316
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc1⤵PID:412
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1284
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1308
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2680
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2748
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3896
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:4584
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2092
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\36f426936db645690496fdee469c34a1.exe"C:\Users\Admin\AppData\Local\Temp\36f426936db645690496fdee469c34a1.exe"1⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Disables RegEdit via registry modification
- Adds Run key to start application
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4920 -s 11402⤵
- Program crash
PID:3040
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca1⤵PID:3972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4920 -ip 49201⤵PID:2712
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe1⤵PID:1724
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe1⤵PID:1548
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:404
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1320
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:3232
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:3808
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3912
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:5060
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4160
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:3608
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:924
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4760
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:436
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4792
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4032
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:4496
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4012
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3984
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3836
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3748
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3580
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3456
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3364
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:3100
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:1088
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2964
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2952
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2756
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2704
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2588
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2472
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2336
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2240
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2232
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2140
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:940
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2020
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:2012
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1964
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1828
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1756
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1736
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1700
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1640
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1508
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1360
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1176
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1132
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1104
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1092
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1048
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:856
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:512
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:944
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:888
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:788
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:764
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:620
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5cf4162ec466b81d39f8c188c1cbc2653
SHA189336630fdf6a1ca0ccf9a4eeba6b644a079919e
SHA256c73992a60fa4b4eb94cf92bafa7be30cdee3af435661f0bf80fe0f9821c90994
SHA51256ed13449c31bfd68d922340fd16410f3b2ecb72b7f4aca608c45037cfb902420e2f4f2230e28a2a631943b8915ccdf00831975ac21832625d09055c6c8c31f5