Analysis
-
max time kernel
165s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 06:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2b63a7ad30d6de52b5f53c5717f82d56.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2b63a7ad30d6de52b5f53c5717f82d56.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
2b63a7ad30d6de52b5f53c5717f82d56.exe
-
Size
166KB
-
MD5
2b63a7ad30d6de52b5f53c5717f82d56
-
SHA1
d97f132bfe9738f43b79eb9cf8b9243dab27e5ce
-
SHA256
d2a62ecb1dedb42307ae5728e7f02ba124094c722ab4dda4074980b419301d87
-
SHA512
0eab90f83dd019724db0d46b47f6cc8f44efef4bc61e5e5e51ef96d4314fd066aa3a536a420ef1dd3f5da70591f5a7a0444560857a5061b7b885ad0644bda85f
-
SSDEEP
3072:mDskFLzTz69/4LJccv5tHXgoYktmBHALhhKbaynAXH+A+Cr+bjWnnq9b2xawZq29:mQk5zTz69QLJccv5tHXgoYktmBHALhhZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3224 Shell.exe 1680 Shell.exe 1968 Shell.exe 60 Shell.exe 684 Shell.exe 4080 Shell.exe 2312 Shell.exe 3408 Shell.exe 3992 Shell.exe 2696 Shell.exe 3240 Shell.exe 4924 Shell.exe 4032 Shell.exe 1984 Shell.exe 4152 Shell.exe 5088 Shell.exe 4644 Shell.exe 4304 Shell.exe 4100 Shell.exe 4132 Shell.exe 3356 Shell.exe 5020 Shell.exe 4648 Shell.exe 1576 Shell.exe 1792 Shell.exe 4680 Shell.exe 680 Shell.exe 5068 Shell.exe 4476 Shell.exe 4688 Shell.exe 5080 Shell.exe 1816 Shell.exe 2876 Shell.exe 4332 Shell.exe 664 Shell.exe 3728 Shell.exe 3608 Shell.exe 3648 Shell.exe 4612 Shell.exe 4228 Shell.exe 3036 Shell.exe 3708 Shell.exe 2512 Shell.exe 4936 Shell.exe 3784 Shell.exe 944 Shell.exe 2252 Shell.exe 4256 Shell.exe 804 Shell.exe 964 Shell.exe 1336 Shell.exe 3148 Shell.exe 3536 Shell.exe 2804 Shell.exe 824 Shell.exe 1964 Shell.exe 2280 Shell.exe 2036 Shell.exe 4488 Shell.exe 4608 Shell.exe 852 Shell.exe 5016 Shell.exe 2432 Shell.exe 4860 Shell.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" WerFault.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Shell.exe = "C:\\Windows\\system32\\Shell.exe" Process not Found -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Deleteme.bat Shell.exe File created C:\Windows\SysWOW64\Shell.exe Process not Found File created C:\Windows\SysWOW64\Shell.exe Shell.exe File created C:\Windows\SysWOW64\Deleteme.bat Shell.exe File opened for modification C:\Windows\SysWOW64\Shell.exe Shell.exe File opened for modification C:\Windows\SysWOW64\Shell.exe Shell.exe File created C:\Windows\SysWOW64\Shell.exe Shell.exe File created C:\Windows\SysWOW64\Shell.exe Shell.exe File created C:\Windows\SysWOW64\Shell.exe Shell.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat Shell.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat Shell.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat Shell.exe File created C:\Windows\SysWOW64\Shell.exe Shell.exe File created C:\Windows\SysWOW64\Shell.exe Shell.exe File opened for modification C:\Windows\SysWOW64\Shell.exe Shell.exe File opened for modification C:\Windows\SysWOW64\Shell.exe Shell.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat Process not Found File created C:\Windows\SysWOW64\Deleteme.bat Shell.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat Process not Found File opened for modification C:\Windows\SysWOW64\Shell.exe Shell.exe File opened for modification C:\Windows\SysWOW64\Shell.exe Shell.exe File created C:\Windows\SysWOW64\Shell.exe Shell.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat Shell.exe File created C:\Windows\SysWOW64\Shell.exe Shell.exe File created C:\Windows\SysWOW64\Shell.exe Shell.exe File opened for modification C:\Windows\SysWOW64\Shell.exe Shell.exe File created C:\Windows\SysWOW64\Shell.exe Process not Found File opened for modification C:\Windows\SysWOW64\Deleteme.bat Process not Found File opened for modification C:\Windows\SysWOW64\Deleteme.bat cmd.exe File opened for modification C:\Windows\SysWOW64\Shell.exe Shell.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat Shell.exe File created C:\Windows\SysWOW64\Shell.exe Shell.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat cmd.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat Shell.exe File opened for modification C:\Windows\SysWOW64\Shell.exe Shell.exe File opened for modification C:\Windows\SysWOW64\Shell.exe Shell.exe File created C:\Windows\SysWOW64\Shell.exe Process not Found File created C:\Windows\SysWOW64\Shell.exe Shell.exe File opened for modification C:\Windows\SysWOW64\Shell.exe Shell.exe File opened for modification C:\Windows\SysWOW64\Shell.exe Shell.exe File opened for modification C:\Windows\SysWOW64\Shell.exe Shell.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat Shell.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat Shell.exe File opened for modification C:\Windows\SysWOW64\Shell.exe Process not Found File created C:\Windows\SysWOW64\Shell.exe Shell.exe File created C:\Windows\SysWOW64\Deleteme.bat Shell.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat Process not Found File created C:\Windows\SysWOW64\Shell.exe Shell.exe File opened for modification C:\Windows\SysWOW64\Shell.exe Shell.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat Shell.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat Shell.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat Process not Found File opened for modification C:\Windows\SysWOW64\Shell.exe Shell.exe File opened for modification C:\Windows\SysWOW64\Shell.exe Shell.exe File opened for modification C:\Windows\SysWOW64\Shell.exe Shell.exe File created C:\Windows\SysWOW64\Shell.exe Shell.exe File created C:\Windows\SysWOW64\Shell.exe Shell.exe File opened for modification C:\Windows\SysWOW64\Shell.exe Shell.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat Shell.exe File created C:\Windows\SysWOW64\Shell.exe Shell.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat Shell.exe File opened for modification C:\Windows\SysWOW64\Shell.exe Process not Found File opened for modification C:\Windows\SysWOW64\Deleteme.bat Process not Found File opened for modification C:\Windows\SysWOW64\Shell.exe Shell.exe -
Program crash 23 IoCs
pid pid_target Process procid_target 6372 4080 WerFault.exe 97 6044 3224 WerFault.exe 92 6168 1968 WerFault.exe 94 4052 684 WerFault.exe 96 6200 1680 WerFault.exe 93 6216 60 WerFault.exe 95 6648 4228 WerFault.exe 131 6184 5264 WerFault.exe 181 6212 5280 WerFault.exe 182 4336 5296 WerFault.exe 183 7152 5312 WerFault.exe 184 7352 5328 WerFault.exe 185 6996 5344 WerFault.exe 186 13436 4228 WerFault.exe 131 13444 5264 WerFault.exe 181 13452 5312 WerFault.exe 184 13460 1680 WerFault.exe 93 9152 8844 WerFault.exe 425 15276 9300 Process not Found 437 15272 9284 Process not Found 436 15312 7064 Process not Found 430 10632 8380 Process not Found 1083 7848 8448 Process not Found 1089 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4928 2b63a7ad30d6de52b5f53c5717f82d56.exe 4928 2b63a7ad30d6de52b5f53c5717f82d56.exe 3224 Shell.exe 3224 Shell.exe 1680 Shell.exe 1680 Shell.exe 1968 Shell.exe 1968 Shell.exe 60 Shell.exe 60 Shell.exe 684 Shell.exe 684 Shell.exe 4080 Shell.exe 4080 Shell.exe 2312 Shell.exe 2312 Shell.exe 3408 Shell.exe 3408 Shell.exe 3992 Shell.exe 3992 Shell.exe 2696 Shell.exe 2696 Shell.exe 3240 Shell.exe 3240 Shell.exe 4924 Shell.exe 4924 Shell.exe 4032 Shell.exe 4032 Shell.exe 1984 Shell.exe 1984 Shell.exe 4152 Shell.exe 4152 Shell.exe 5088 Shell.exe 5088 Shell.exe 4644 Shell.exe 4644 Shell.exe 4304 Shell.exe 4304 Shell.exe 4100 Shell.exe 4100 Shell.exe 4132 Shell.exe 4132 Shell.exe 3356 Shell.exe 3356 Shell.exe 5020 Shell.exe 5020 Shell.exe 4648 Shell.exe 4648 Shell.exe 1576 Shell.exe 1576 Shell.exe 1792 Shell.exe 1792 Shell.exe 4680 Shell.exe 4680 Shell.exe 680 Shell.exe 680 Shell.exe 5068 Shell.exe 5068 Shell.exe 4476 Shell.exe 4476 Shell.exe 4688 Shell.exe 4688 Shell.exe 5080 Shell.exe 5080 Shell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4928 wrote to memory of 3224 4928 2b63a7ad30d6de52b5f53c5717f82d56.exe 92 PID 4928 wrote to memory of 3224 4928 2b63a7ad30d6de52b5f53c5717f82d56.exe 92 PID 4928 wrote to memory of 3224 4928 2b63a7ad30d6de52b5f53c5717f82d56.exe 92 PID 3224 wrote to memory of 1680 3224 Shell.exe 93 PID 3224 wrote to memory of 1680 3224 Shell.exe 93 PID 3224 wrote to memory of 1680 3224 Shell.exe 93 PID 1680 wrote to memory of 1968 1680 Shell.exe 94 PID 1680 wrote to memory of 1968 1680 Shell.exe 94 PID 1680 wrote to memory of 1968 1680 Shell.exe 94 PID 1968 wrote to memory of 60 1968 Shell.exe 95 PID 1968 wrote to memory of 60 1968 Shell.exe 95 PID 1968 wrote to memory of 60 1968 Shell.exe 95 PID 60 wrote to memory of 684 60 Shell.exe 96 PID 60 wrote to memory of 684 60 Shell.exe 96 PID 60 wrote to memory of 684 60 Shell.exe 96 PID 684 wrote to memory of 4080 684 Shell.exe 97 PID 684 wrote to memory of 4080 684 Shell.exe 97 PID 684 wrote to memory of 4080 684 Shell.exe 97 PID 4080 wrote to memory of 2312 4080 Shell.exe 98 PID 4080 wrote to memory of 2312 4080 Shell.exe 98 PID 4080 wrote to memory of 2312 4080 Shell.exe 98 PID 2312 wrote to memory of 3408 2312 Shell.exe 99 PID 2312 wrote to memory of 3408 2312 Shell.exe 99 PID 2312 wrote to memory of 3408 2312 Shell.exe 99 PID 3408 wrote to memory of 3992 3408 Shell.exe 100 PID 3408 wrote to memory of 3992 3408 Shell.exe 100 PID 3408 wrote to memory of 3992 3408 Shell.exe 100 PID 3992 wrote to memory of 2696 3992 Shell.exe 101 PID 3992 wrote to memory of 2696 3992 Shell.exe 101 PID 3992 wrote to memory of 2696 3992 Shell.exe 101 PID 2696 wrote to memory of 3240 2696 Shell.exe 102 PID 2696 wrote to memory of 3240 2696 Shell.exe 102 PID 2696 wrote to memory of 3240 2696 Shell.exe 102 PID 3240 wrote to memory of 4924 3240 Shell.exe 103 PID 3240 wrote to memory of 4924 3240 Shell.exe 103 PID 3240 wrote to memory of 4924 3240 Shell.exe 103 PID 4924 wrote to memory of 4032 4924 Shell.exe 104 PID 4924 wrote to memory of 4032 4924 Shell.exe 104 PID 4924 wrote to memory of 4032 4924 Shell.exe 104 PID 4032 wrote to memory of 1984 4032 Shell.exe 105 PID 4032 wrote to memory of 1984 4032 Shell.exe 105 PID 4032 wrote to memory of 1984 4032 Shell.exe 105 PID 1984 wrote to memory of 4152 1984 Shell.exe 106 PID 1984 wrote to memory of 4152 1984 Shell.exe 106 PID 1984 wrote to memory of 4152 1984 Shell.exe 106 PID 4152 wrote to memory of 5088 4152 Shell.exe 107 PID 4152 wrote to memory of 5088 4152 Shell.exe 107 PID 4152 wrote to memory of 5088 4152 Shell.exe 107 PID 5088 wrote to memory of 4644 5088 Shell.exe 108 PID 5088 wrote to memory of 4644 5088 Shell.exe 108 PID 5088 wrote to memory of 4644 5088 Shell.exe 108 PID 4644 wrote to memory of 4304 4644 Shell.exe 109 PID 4644 wrote to memory of 4304 4644 Shell.exe 109 PID 4644 wrote to memory of 4304 4644 Shell.exe 109 PID 4304 wrote to memory of 4100 4304 Shell.exe 110 PID 4304 wrote to memory of 4100 4304 Shell.exe 110 PID 4304 wrote to memory of 4100 4304 Shell.exe 110 PID 4100 wrote to memory of 4132 4100 Shell.exe 111 PID 4100 wrote to memory of 4132 4100 Shell.exe 111 PID 4100 wrote to memory of 4132 4100 Shell.exe 111 PID 4132 wrote to memory of 3356 4132 Shell.exe 112 PID 4132 wrote to memory of 3356 4132 Shell.exe 112 PID 4132 wrote to memory of 3356 4132 Shell.exe 112 PID 3356 wrote to memory of 5020 3356 Shell.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b63a7ad30d6de52b5f53c5717f82d56.exe"C:\Users\Admin\AppData\Local\Temp\2b63a7ad30d6de52b5f53c5717f82d56.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe11⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe13⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe16⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe18⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe19⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe20⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5020 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe24⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4648 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe25⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1576 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe26⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1792 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe27⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4680 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe28⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:680 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe29⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:5068 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe30⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4476 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe31⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4688 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe32⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5080 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe33⤵
- Executes dropped EXE
PID:1816 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe34⤵
- Executes dropped EXE
PID:2876 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe35⤵
- Executes dropped EXE
PID:4332 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe36⤵
- Executes dropped EXE
PID:664 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe37⤵
- Executes dropped EXE
PID:3728 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe38⤵
- Executes dropped EXE
PID:3608 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe39⤵
- Executes dropped EXE
PID:3648 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe40⤵
- Executes dropped EXE
PID:4612 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe41⤵
- Executes dropped EXE
PID:4228 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe42⤵
- Executes dropped EXE
PID:3036 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe43⤵
- Executes dropped EXE
PID:3708 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe44⤵
- Executes dropped EXE
PID:2512 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe45⤵
- Executes dropped EXE
PID:4936 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe46⤵
- Executes dropped EXE
PID:3784 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe47⤵
- Executes dropped EXE
PID:944 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe48⤵
- Executes dropped EXE
PID:2252 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe49⤵
- Executes dropped EXE
PID:4256 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe50⤵
- Executes dropped EXE
PID:804 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe51⤵
- Executes dropped EXE
PID:964 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe52⤵
- Executes dropped EXE
PID:1336 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3148 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe54⤵
- Executes dropped EXE
PID:3536 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2804 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe56⤵
- Executes dropped EXE
PID:824 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe57⤵
- Executes dropped EXE
PID:1964 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe58⤵
- Executes dropped EXE
PID:2280 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe59⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2036 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe60⤵
- Executes dropped EXE
PID:4488 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe61⤵
- Executes dropped EXE
PID:4608 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:852 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe63⤵
- Executes dropped EXE
PID:5016 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe64⤵
- Executes dropped EXE
PID:2432 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe65⤵
- Executes dropped EXE
PID:4860 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe66⤵PID:792
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe67⤵PID:3760
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe68⤵PID:1516
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe69⤵PID:220
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe70⤵PID:4832
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe71⤵PID:4368
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe72⤵PID:4584
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe73⤵PID:4068
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe74⤵PID:3140
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe75⤵PID:3384
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe76⤵PID:1028
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe77⤵PID:4028
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe78⤵
- Adds Run key to start application
PID:5084 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe79⤵PID:3204
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe80⤵PID:1456
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe81⤵PID:2004
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe82⤵
- Drops file in System32 directory
PID:5124 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe83⤵PID:5140
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe84⤵
- Adds Run key to start application
PID:5156 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe85⤵PID:5172
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe86⤵PID:5188
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe87⤵PID:5204
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe88⤵PID:5220
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe89⤵
- Drops file in System32 directory
PID:5248 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe90⤵PID:5264
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe91⤵PID:5280
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe92⤵
- Drops file in System32 directory
PID:5296 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe93⤵PID:5312
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe94⤵
- Adds Run key to start application
PID:5328 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe95⤵PID:5344
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe96⤵PID:5360
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe97⤵PID:5376
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe98⤵PID:5392
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe99⤵
- Drops file in System32 directory
PID:5408 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe100⤵PID:5428
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe101⤵
- Drops file in System32 directory
PID:5444 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe102⤵PID:5460
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe103⤵PID:5476
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe104⤵PID:5492
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe105⤵PID:5516
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe106⤵PID:5540
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe107⤵PID:5556
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe108⤵PID:5572
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe109⤵PID:5588
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe110⤵PID:5604
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe111⤵PID:5624
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe112⤵PID:5648
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe113⤵PID:5680
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe114⤵PID:5708
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe115⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:5752 -
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe116⤵PID:5788
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe117⤵PID:5808
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe118⤵PID:5828
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe119⤵PID:5844
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe120⤵PID:5864
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe121⤵PID:5880
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe122⤵PID:5896
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-