Analysis
-
max time kernel
878s -
max time network
828s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 12:32
Static task
static1
Behavioral task
behavioral1
Sample
Screen_231207_221346.png
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Screen_231207_221346.png
Resource
win10v2004-20231215-en
General
-
Target
Screen_231207_221346.png
-
Size
981KB
-
MD5
da127ad4e64ecc9b8edfa950d53809f2
-
SHA1
c293e95bc0d0a222c1f61931d1f7eeb7dc642af9
-
SHA256
83a949a96411c1aafd03beff711a7195c646227235f9615d6747fcd971a3ed03
-
SHA512
9c5baa484373d39e71136d96359bd33739368a47ca05da2fb3e87bd444d9598de50aa788769800529c166653e563f48f4e14f643f03baac30e396e3405d78a33
-
SSDEEP
24576:6XKSz55rNG4FiOxyc9/alDsgdNskyeLINPIGMj+rm6Fg/Fh:IKSz3rAyJ3GsgdNXG8+Mdh
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 10 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe -
Modifies registry class 55 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 notepad.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\NodeSlot = "2" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" notepad.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags notepad.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 notepad.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell notepad.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" notepad.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 notepad.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" notepad.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = ffffffff notepad.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 = 3a002e803accbfb42cdb4c42b0297fe99a87c641260001002600efbe11000000a6c70c85472fda014c308587472fda016bd74f88472fda0114000000 notepad.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" notepad.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff notepad.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 notepad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" notepad.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0100000000000000ffffffff notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" notepad.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 notepad.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots notepad.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" notepad.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2716 notepad.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeCreateGlobalPrivilege 13016 dwm.exe Token: SeChangeNotifyPrivilege 13016 dwm.exe Token: 33 13016 dwm.exe Token: SeIncBasePriorityPrivilege 13016 dwm.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2716 notepad.exe 2716 notepad.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2716 notepad.exe 2716 notepad.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2716 notepad.exe 2716 notepad.exe 2716 notepad.exe 2716 notepad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2460 wrote to memory of 1052 2460 cmd.exe 133 PID 2460 wrote to memory of 1052 2460 cmd.exe 133 PID 4248 wrote to memory of 2624 4248 cmd.exe 147 PID 4248 wrote to memory of 2624 4248 cmd.exe 147 PID 4248 wrote to memory of 3676 4248 cmd.exe 148 PID 4248 wrote to memory of 3676 4248 cmd.exe 148 PID 4248 wrote to memory of 2596 4248 cmd.exe 150 PID 4248 wrote to memory of 2596 4248 cmd.exe 150 PID 4248 wrote to memory of 708 4248 cmd.exe 153 PID 4248 wrote to memory of 708 4248 cmd.exe 153 PID 4248 wrote to memory of 4920 4248 cmd.exe 154 PID 4248 wrote to memory of 4920 4248 cmd.exe 154 PID 4248 wrote to memory of 4888 4248 cmd.exe 155 PID 4248 wrote to memory of 4888 4248 cmd.exe 155 PID 4248 wrote to memory of 392 4248 cmd.exe 156 PID 4248 wrote to memory of 392 4248 cmd.exe 156 PID 4248 wrote to memory of 556 4248 cmd.exe 352 PID 4248 wrote to memory of 556 4248 cmd.exe 352 PID 4248 wrote to memory of 1584 4248 cmd.exe 351 PID 4248 wrote to memory of 1584 4248 cmd.exe 351 PID 4248 wrote to memory of 2224 4248 cmd.exe 350 PID 4248 wrote to memory of 2224 4248 cmd.exe 350 PID 4248 wrote to memory of 4688 4248 cmd.exe 348 PID 4248 wrote to memory of 4688 4248 cmd.exe 348 PID 4248 wrote to memory of 1620 4248 cmd.exe 347 PID 4248 wrote to memory of 1620 4248 cmd.exe 347 PID 4248 wrote to memory of 4124 4248 cmd.exe 161 PID 4248 wrote to memory of 4124 4248 cmd.exe 161 PID 4248 wrote to memory of 4488 4248 cmd.exe 159 PID 4248 wrote to memory of 4488 4248 cmd.exe 159 PID 4248 wrote to memory of 3212 4248 cmd.exe 157 PID 4248 wrote to memory of 3212 4248 cmd.exe 157 PID 4248 wrote to memory of 1952 4248 cmd.exe 346 PID 4248 wrote to memory of 1952 4248 cmd.exe 346 PID 4248 wrote to memory of 2116 4248 cmd.exe 344 PID 4248 wrote to memory of 2116 4248 cmd.exe 344 PID 4248 wrote to memory of 3632 4248 cmd.exe 342 PID 4248 wrote to memory of 3632 4248 cmd.exe 342 PID 4248 wrote to memory of 4832 4248 cmd.exe 340 PID 4248 wrote to memory of 4832 4248 cmd.exe 340 PID 4248 wrote to memory of 2572 4248 cmd.exe 339 PID 4248 wrote to memory of 2572 4248 cmd.exe 339 PID 4248 wrote to memory of 3028 4248 cmd.exe 338 PID 4248 wrote to memory of 3028 4248 cmd.exe 338 PID 4248 wrote to memory of 4320 4248 cmd.exe 336 PID 4248 wrote to memory of 4320 4248 cmd.exe 336 PID 4248 wrote to memory of 1904 4248 cmd.exe 335 PID 4248 wrote to memory of 1904 4248 cmd.exe 335 PID 4248 wrote to memory of 5004 4248 cmd.exe 334 PID 4248 wrote to memory of 5004 4248 cmd.exe 334 PID 4248 wrote to memory of 4484 4248 cmd.exe 333 PID 4248 wrote to memory of 4484 4248 cmd.exe 333 PID 4248 wrote to memory of 5036 4248 cmd.exe 331 PID 4248 wrote to memory of 5036 4248 cmd.exe 331 PID 4248 wrote to memory of 4744 4248 cmd.exe 329 PID 4248 wrote to memory of 4744 4248 cmd.exe 329 PID 4248 wrote to memory of 1304 4248 cmd.exe 312 PID 4248 wrote to memory of 1304 4248 cmd.exe 312 PID 4248 wrote to memory of 1804 4248 cmd.exe 311 PID 4248 wrote to memory of 1804 4248 cmd.exe 311 PID 4248 wrote to memory of 2656 4248 cmd.exe 310 PID 4248 wrote to memory of 2656 4248 cmd.exe 310 PID 4248 wrote to memory of 2668 4248 cmd.exe 308 PID 4248 wrote to memory of 2668 4248 cmd.exe 308
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Screen_231207_221346.png1⤵PID:5052
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\system32\diskpart.exediskpart2⤵PID:1052
-
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:4336
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:5036
-
C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2716
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\moblie.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\system32\cmd.execmd.exe2⤵PID:2624
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3676
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2596
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:708
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4920
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4888
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:392
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3212
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4488
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4124
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1532
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:224
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1792
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3712
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1348
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2556
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:116
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:548
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1984
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4808
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1668
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:644
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:420
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2296
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4000
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4444
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4404
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3596
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:228
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1712
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3216
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1840
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4756
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1456
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1816
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3612
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1672
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1092
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2200
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3920
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4916
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1492
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3032
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3860
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2460
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3828
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:500
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2552
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4148
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5064
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:776
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2376
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:464
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1432
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2728
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3284
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1144
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2208
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4044
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1756
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2724
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:240
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3144
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6460
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:836
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4292
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2028
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4944
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2808
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3428
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2560
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3368
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4168
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4696
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2668
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2656
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1804
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1304
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6492
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6560
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6552
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6544
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6532
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6524
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6516
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6508
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4744
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5036
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4484
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5004
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1904
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4320
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3028
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2572
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4832
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3632
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2116
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1952
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1620
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4688
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2224
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1584
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:556
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6748
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6760
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7224
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7528
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8160
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7240
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8248
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8240
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8232
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8224
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8216
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8208
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8184
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8176
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8508
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8628
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8672
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8688
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8772
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8784
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8884
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8916
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8908
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8900
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8684
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8528
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8288
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8312
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8328
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8196
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8172
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9208
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9200
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9192
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9184
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9176
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9168
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9160
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9152
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9144
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9136
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9128
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9120
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9112
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9104
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9096
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9088
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9080
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9072
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9064
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9056
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9048
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9040
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9032
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9024
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9016
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9008
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9000
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8992
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8984
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8976
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8940
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9820
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10648
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10656
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10672
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10688
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10908
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10924
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11132
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11124
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11116
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11108
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11100
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11092
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11084
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11076
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11068
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11060
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11052
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11044
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11036
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11028
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11020
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11012
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11004
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10996
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10988
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10980
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10972
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10964
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10932
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11460
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12024
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12052
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12036
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12248
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12396
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12388
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12380
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12372
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12364
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12356
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12348
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12340
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12328
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12320
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12312
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12304
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12296
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12144
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12048
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4852
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10960
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11292
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10920
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11216
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11364
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11316
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11308
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11276
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10700
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11208
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11160
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12280
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12272
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12264
-
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:13016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36B
MD5b6a5a883c973e801a69c996567a5d16f
SHA1e1c7c3f8dd0a7b809ff6383dada6b251e1b28fe7
SHA256905c769da4ede7b11141ec8fec58ee83a4259dce2f0621f2eb1571f112212ed9
SHA512407dc5394ea982e171963815f028ff8b29b37c9366c06b9c36f3c3d50087cc91f16f2e115871046935e92579b56dc308ccb6aacb4ff27b6e3ddf259ddaebc167