Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 09:59
Static task
static1
Behavioral task
behavioral1
Sample
152e9894347fd4e57954028f330c0837.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
152e9894347fd4e57954028f330c0837.exe
Resource
win10v2004-20231215-en
General
-
Target
152e9894347fd4e57954028f330c0837.exe
-
Size
4.1MB
-
MD5
152e9894347fd4e57954028f330c0837
-
SHA1
acf9ddceee55f0bdd785b074809d6dedb914521e
-
SHA256
d763fb5ec25dc941cc01c9e3621b28fffa846fd687ea8defdecbbcd7d44ba865
-
SHA512
51b69e2d2c68c371cfe0d355e2590f60c693e040fa20af2b72f6e27be6ebc77c21353a1939a4abacc695607410ca5b3f8e951a951bd877b329ae48f53d7d855d
-
SSDEEP
49152:qdhwrvi963PSumT0+TFiH7efPp3Z03guLI3pXCLLZldj6tCi+KfXGujLYV1gX8:qdhwq6+6efPYwuc3ELFld2qcGEW/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 152e9894347fd4e57954028f330c0837.exe -
Executes dropped EXE 2 IoCs
pid Process 2676 ScreenConnect.ClientService.exe 1268 ScreenConnect.WindowsClient.exe -
Loads dropped DLL 25 IoCs
pid Process 3464 MsiExec.exe 3140 rundll32.exe 3140 rundll32.exe 3140 rundll32.exe 3140 rundll32.exe 3140 rundll32.exe 3140 rundll32.exe 3140 rundll32.exe 2828 MsiExec.exe 2828 MsiExec.exe 2828 MsiExec.exe 4700 MsiExec.exe 4700 MsiExec.exe 2676 ScreenConnect.ClientService.exe 2676 ScreenConnect.ClientService.exe 2676 ScreenConnect.ClientService.exe 2676 ScreenConnect.ClientService.exe 2676 ScreenConnect.ClientService.exe 2676 ScreenConnect.ClientService.exe 2676 ScreenConnect.ClientService.exe 2676 ScreenConnect.ClientService.exe 2676 ScreenConnect.ClientService.exe 2676 ScreenConnect.ClientService.exe 2676 ScreenConnect.ClientService.exe 2676 ScreenConnect.ClientService.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files (x86)\ScreenConnect Client (0557653572935cb6)\app.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0557653572935cb6)\Client.en-US.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0557653572935cb6)\Client.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0557653572935cb6)\system.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0557653572935cb6)\ScreenConnect.ClientService.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0557653572935cb6)\ScreenConnect.Core.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0557653572935cb6)\ScreenConnect.Windows.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0557653572935cb6)\ScreenConnect.ClientService.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0557653572935cb6)\ScreenConnect.Client.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0557653572935cb6)\ScreenConnect.WindowsClient.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0557653572935cb6)\ScreenConnect.WindowsClient.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (0557653572935cb6)\Client.Override.en-US.resources msiexec.exe -
Drops file in Windows directory 16 IoCs
description ioc Process File opened for modification C:\Windows\Installer\e57758e.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI7709.tmp msiexec.exe File created C:\Windows\Installer\wix{687E181B-5BB5-4082-B741-296211A45EF9}.SchedServiceConfig.rmi MsiExec.exe File created C:\Windows\Installer\{687E181B-5BB5-4082-B741-296211A45EF9}\DefaultIcon msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\e577590.msi msiexec.exe File created C:\Windows\Installer\e57758e.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{687E181B-5BB5-4082-B741-296211A45EF9} msiexec.exe File opened for modification C:\Windows\Installer\MSI7639.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI763A.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI767A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI769A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7738.tmp msiexec.exe File opened for modification C:\Windows\Installer\{687E181B-5BB5-4082-B741-296211A45EF9}\DefaultIcon msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\22\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\23 msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ScreenConnect.ClientService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.ClientService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections ScreenConnect.ClientService.exe -
Modifies registry class 32 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\B181E7865BB528047B149226114AE59F msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B181E7865BB528047B149226114AE59F\SourceList\Net msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B181E7865BB528047B149226114AE59F\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B181E7865BB528047B149226114AE59F\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-0557653572935cb6\shell msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B181E7865BB528047B149226114AE59F\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B181E7865BB528047B149226114AE59F\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B181E7865BB528047B149226114AE59F\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B181E7865BB528047B149226114AE59F\SourceList\Media\1 = ";" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B181E7865BB528047B149226114AE59F\Language = "1033" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\A49130C130D06A2E507556532739C56B msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\A49130C130D06A2E507556532739C56B\B181E7865BB528047B149226114AE59F msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-0557653572935cb6\shell\open\command msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-0557653572935cb6\shell\open\command\ = "\"C:\\Program Files (x86)\\ScreenConnect Client (0557653572935cb6)\\ScreenConnect.WindowsClient.exe\" \"%1\"" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\B181E7865BB528047B149226114AE59F\Full msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B181E7865BB528047B149226114AE59F\PackageCode = "DF722240FC1F3AB46A03F08044D8B083" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B181E7865BB528047B149226114AE59F\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B181E7865BB528047B149226114AE59F\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-0557653572935cb6 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B181E7865BB528047B149226114AE59F\Version = "352915367" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B181E7865BB528047B149226114AE59F\ProductIcon = "C:\\Windows\\Installer\\{687E181B-5BB5-4082-B741-296211A45EF9}\\DefaultIcon" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B181E7865BB528047B149226114AE59F\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B181E7865BB528047B149226114AE59F\SourceList\Media msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-0557653572935cb6\UseOriginalUrlEncoding = "1" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-0557653572935cb6\shell\open\command msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B181E7865BB528047B149226114AE59F msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-0557653572935cb6\shell\open msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B181E7865BB528047B149226114AE59F\ProductName = "ScreenConnect Client (0557653572935cb6)" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-0557653572935cb6 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-0557653572935cb6\URL Protocol msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B181E7865BB528047B149226114AE59F\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B181E7865BB528047B149226114AE59F\SourceList\PackageName = "setup.msi" msiexec.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5104 msiexec.exe 5104 msiexec.exe 2676 ScreenConnect.ClientService.exe 2676 ScreenConnect.ClientService.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 996 152e9894347fd4e57954028f330c0837.exe Token: SeShutdownPrivilege 2896 msiexec.exe Token: SeIncreaseQuotaPrivilege 2896 msiexec.exe Token: SeSecurityPrivilege 5104 msiexec.exe Token: SeCreateTokenPrivilege 2896 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2896 msiexec.exe Token: SeLockMemoryPrivilege 2896 msiexec.exe Token: SeIncreaseQuotaPrivilege 2896 msiexec.exe Token: SeMachineAccountPrivilege 2896 msiexec.exe Token: SeTcbPrivilege 2896 msiexec.exe Token: SeSecurityPrivilege 2896 msiexec.exe Token: SeTakeOwnershipPrivilege 2896 msiexec.exe Token: SeLoadDriverPrivilege 2896 msiexec.exe Token: SeSystemProfilePrivilege 2896 msiexec.exe Token: SeSystemtimePrivilege 2896 msiexec.exe Token: SeProfSingleProcessPrivilege 2896 msiexec.exe Token: SeIncBasePriorityPrivilege 2896 msiexec.exe Token: SeCreatePagefilePrivilege 2896 msiexec.exe Token: SeCreatePermanentPrivilege 2896 msiexec.exe Token: SeBackupPrivilege 2896 msiexec.exe Token: SeRestorePrivilege 2896 msiexec.exe Token: SeShutdownPrivilege 2896 msiexec.exe Token: SeDebugPrivilege 2896 msiexec.exe Token: SeAuditPrivilege 2896 msiexec.exe Token: SeSystemEnvironmentPrivilege 2896 msiexec.exe Token: SeChangeNotifyPrivilege 2896 msiexec.exe Token: SeRemoteShutdownPrivilege 2896 msiexec.exe Token: SeUndockPrivilege 2896 msiexec.exe Token: SeSyncAgentPrivilege 2896 msiexec.exe Token: SeEnableDelegationPrivilege 2896 msiexec.exe Token: SeManageVolumePrivilege 2896 msiexec.exe Token: SeImpersonatePrivilege 2896 msiexec.exe Token: SeCreateGlobalPrivilege 2896 msiexec.exe Token: SeCreateTokenPrivilege 2896 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2896 msiexec.exe Token: SeLockMemoryPrivilege 2896 msiexec.exe Token: SeIncreaseQuotaPrivilege 2896 msiexec.exe Token: SeMachineAccountPrivilege 2896 msiexec.exe Token: SeTcbPrivilege 2896 msiexec.exe Token: SeSecurityPrivilege 2896 msiexec.exe Token: SeTakeOwnershipPrivilege 2896 msiexec.exe Token: SeLoadDriverPrivilege 2896 msiexec.exe Token: SeSystemProfilePrivilege 2896 msiexec.exe Token: SeSystemtimePrivilege 2896 msiexec.exe Token: SeProfSingleProcessPrivilege 2896 msiexec.exe Token: SeIncBasePriorityPrivilege 2896 msiexec.exe Token: SeCreatePagefilePrivilege 2896 msiexec.exe Token: SeCreatePermanentPrivilege 2896 msiexec.exe Token: SeBackupPrivilege 2896 msiexec.exe Token: SeRestorePrivilege 2896 msiexec.exe Token: SeShutdownPrivilege 2896 msiexec.exe Token: SeDebugPrivilege 2896 msiexec.exe Token: SeAuditPrivilege 2896 msiexec.exe Token: SeSystemEnvironmentPrivilege 2896 msiexec.exe Token: SeChangeNotifyPrivilege 2896 msiexec.exe Token: SeRemoteShutdownPrivilege 2896 msiexec.exe Token: SeUndockPrivilege 2896 msiexec.exe Token: SeSyncAgentPrivilege 2896 msiexec.exe Token: SeEnableDelegationPrivilege 2896 msiexec.exe Token: SeManageVolumePrivilege 2896 msiexec.exe Token: SeImpersonatePrivilege 2896 msiexec.exe Token: SeCreateGlobalPrivilege 2896 msiexec.exe Token: SeCreateTokenPrivilege 2896 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2896 msiexec.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2896 msiexec.exe 1268 ScreenConnect.WindowsClient.exe 2896 msiexec.exe 1268 ScreenConnect.WindowsClient.exe 1268 ScreenConnect.WindowsClient.exe 1268 ScreenConnect.WindowsClient.exe 1268 ScreenConnect.WindowsClient.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 1268 ScreenConnect.WindowsClient.exe 1268 ScreenConnect.WindowsClient.exe 1268 ScreenConnect.WindowsClient.exe 1268 ScreenConnect.WindowsClient.exe 1268 ScreenConnect.WindowsClient.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 996 wrote to memory of 2896 996 152e9894347fd4e57954028f330c0837.exe 25 PID 996 wrote to memory of 2896 996 152e9894347fd4e57954028f330c0837.exe 25 PID 996 wrote to memory of 2896 996 152e9894347fd4e57954028f330c0837.exe 25 PID 5104 wrote to memory of 3464 5104 msiexec.exe 33 PID 5104 wrote to memory of 3464 5104 msiexec.exe 33 PID 5104 wrote to memory of 3464 5104 msiexec.exe 33 PID 3464 wrote to memory of 3140 3464 MsiExec.exe 34 PID 3464 wrote to memory of 3140 3464 MsiExec.exe 34 PID 3464 wrote to memory of 3140 3464 MsiExec.exe 34 PID 5104 wrote to memory of 4980 5104 msiexec.exe 106 PID 5104 wrote to memory of 4980 5104 msiexec.exe 106 PID 5104 wrote to memory of 2828 5104 msiexec.exe 112 PID 5104 wrote to memory of 2828 5104 msiexec.exe 112 PID 5104 wrote to memory of 2828 5104 msiexec.exe 112 PID 5104 wrote to memory of 4700 5104 msiexec.exe 108 PID 5104 wrote to memory of 4700 5104 msiexec.exe 108 PID 5104 wrote to memory of 4700 5104 msiexec.exe 108 PID 2676 wrote to memory of 1268 2676 ScreenConnect.ClientService.exe 110 PID 2676 wrote to memory of 1268 2676 ScreenConnect.ClientService.exe 110 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\152e9894347fd4e57954028f330c0837.exe"C:\Users\Admin\AppData\Local\Temp\152e9894347fd4e57954028f330c0837.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\setup.msi"2⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2896
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 66371F5046F07561EDDF1500A3EE5F0A C2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI4B41.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240601984 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments3⤵
- Loads dropped DLL
PID:3140
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:4980
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 0713AC0C9F145DCDD206623290CC6886 E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:4700
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F259D45C98BD3A9FE52EC990C243CFC62⤵
- Loads dropped DLL
PID:2828
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:2660
-
C:\Program Files (x86)\ScreenConnect Client (0557653572935cb6)\ScreenConnect.ClientService.exe"C:\Program Files (x86)\ScreenConnect Client (0557653572935cb6)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=help.tbcit.co.uk&p=8041&s=feda58ca-b8ab-4bc5-89f3-af2909926d70&k=BgIAAACkAABSU0ExAAgAAAEAAQD%2fRVKwCDhTAYjNZvhpj4NKmPP00Wkv5Prao0XtXQQPEEYvaNXZmXPdBluPxJKjB2HsNeSR4m7el4V6quql9oru44cfS0XD3lLU3%2fXEtOZm4CIbhvwpZexoNs4wk1B3dWS6KrihsncgnZ3DKme7JdobU7OmO5mxr9EMn%2frnyzb5IFptEG7yCMpARL5NVgkXwFAgbHqcwpOLy7oSF7asnfSuRXZolfizXefmcMF8mzgUtmLtAnbilSn9nUdgMXt9LfJyh4tEW2IyjQK%2ftiPGtN%2f4MUCRm1IK9vMBQyjlQQE7UA8VVyHq2NojFV1OyTmoGUaedNmQB3u2&t=&c=Atelier%20Ten&c=Head%20Office&c=&c=&c=&c=&c=&c="1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\ScreenConnect Client (0557653572935cb6)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (0557653572935cb6)\ScreenConnect.WindowsClient.exe" "RunRole" "38ae8eab-d4c8-46c8-9d03-0dd3f0e159e5" "User"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD556c5c38933bd0a89a504bd524c837621
SHA19e63e2bea6ab447583aed5add57af2cf5a7f5e05
SHA25642de3fc10674e354f90cbe6a2e60115129d0e64837c388faee23668d482f771f
SHA512d4fad1b89d4ce4eaaf49f59ec9846b19ab7a8b78031cc8a6737b12b37b2ac053470cfc10d0e2e89c0b2106e9ca5424bf1eb91abf0aaa491f19fc78162e0e2095
-
Filesize
92KB
MD56d300939fc83fd9ac0b108892acfd1fb
SHA175594df16c88fb79806a36bf20b848150e48b618
SHA2568eaf035497e0800fbabd10ef0c44c26ed671d0a693ff614152499a9e6f850ef7
SHA5125f1e4bfcb95ee8829d78e8d2be7756e0d4b6abc331362758ce820ba0dcb34e02f9677c0b6efe7806c779f035f5e67dc98d1ae36f0a7aac32325de917e1c3ad46