Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 07:52
Static task
static1
Behavioral task
behavioral1
Sample
586252db9974d82bdac40f0bad24e035.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
586252db9974d82bdac40f0bad24e035.exe
Resource
win10v2004-20231215-en
General
-
Target
586252db9974d82bdac40f0bad24e035.exe
-
Size
28KB
-
MD5
586252db9974d82bdac40f0bad24e035
-
SHA1
ace366b1f030485531d391a2098942101b671fe1
-
SHA256
7a9aeda8aef241179de9ea7aad1180f8498e68b69a1a6fd5bb9a0ee5ce750965
-
SHA512
203c8184e8b889372eb8962ba3e2c3bc5b8733154382a4c47f95624fabf2a3e37c3c3417874636948d21f25601e0f239898733272855b0650a5f34dc5050dc92
-
SSDEEP
768:F4o0EI24p9oYDVFy9QBfziUX+lKoObfHT5BoDP:aoI24vVN75cOL12b
Malware Config
Signatures
-
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwstub.EXE 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safeboxTray.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRegEx.EXE 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rsaupd.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RSTray.EXE 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPfwSvc.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavTask.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Frameworkservice.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAV.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavStub.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RSTray.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojanDetector.EXE 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojDie.KXP\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavTask.EXE 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GuardField.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SREngLdr.EXE 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AutoRun.EXE 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AutoRun.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32krn.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rsnetsvr.EXE 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32krn.EXE 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPC32.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RsAgent.EXE 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPfwSvc.EXE 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Mmsk.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAV.EXE 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RsAgent.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rsaupd.EXE 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.COM 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Navapsvc.EXE 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASARP.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kmailmon.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCenter.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVPFW.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ArSwp.EXE 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Mmsk.EXE 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.EXE 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ScanFrm.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safe.EXE 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvMonitor.EXE 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nod32kui.EXE 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPC32.EXE 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIARP.EXE 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavstart.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GuardField.EXE 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Trojanwall.EXE 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVWSC.EXE 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ScanFrm.EXE 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Frameworkservice.EXE 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIARP.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Runiep.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GFUpd.EXE 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCenter.EXE 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwsrv.EXE 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PFW.EXE 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GFUpd.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonxp.KXP\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regedit.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMon.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwmain.EXE 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kav32.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" 586252db9974d82bdac40f0bad24e035.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\sisl\ImagePath = "\\??\\C:\\Windows\\Fonts\\sisl.fon" rundll32.exe -
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 972 ALKS.pif -
Loads dropped DLL 2 IoCs
pid Process 3264 rundll32.exe 4256 586252db9974d82bdac40f0bad24e035.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\t: 586252db9974d82bdac40f0bad24e035.exe File opened (read-only) \??\r: 586252db9974d82bdac40f0bad24e035.exe File opened (read-only) \??\s: 586252db9974d82bdac40f0bad24e035.exe File opened (read-only) \??\g: 586252db9974d82bdac40f0bad24e035.exe File opened (read-only) \??\k: 586252db9974d82bdac40f0bad24e035.exe File opened (read-only) \??\m: 586252db9974d82bdac40f0bad24e035.exe File opened (read-only) \??\o: 586252db9974d82bdac40f0bad24e035.exe File opened (read-only) \??\w: 586252db9974d82bdac40f0bad24e035.exe File opened (read-only) \??\x: 586252db9974d82bdac40f0bad24e035.exe File opened (read-only) \??\y: 586252db9974d82bdac40f0bad24e035.exe File opened (read-only) \??\z: 586252db9974d82bdac40f0bad24e035.exe File opened (read-only) \??\e: 586252db9974d82bdac40f0bad24e035.exe File opened (read-only) \??\h: 586252db9974d82bdac40f0bad24e035.exe File opened (read-only) \??\i: 586252db9974d82bdac40f0bad24e035.exe File opened (read-only) \??\n: 586252db9974d82bdac40f0bad24e035.exe File opened (read-only) \??\u: 586252db9974d82bdac40f0bad24e035.exe File opened (read-only) \??\v: 586252db9974d82bdac40f0bad24e035.exe File opened (read-only) \??\j: 586252db9974d82bdac40f0bad24e035.exe File opened (read-only) \??\l: 586252db9974d82bdac40f0bad24e035.exe File opened (read-only) \??\p: 586252db9974d82bdac40f0bad24e035.exe File opened (read-only) \??\q: 586252db9974d82bdac40f0bad24e035.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created \??\c:\AUTORUN.INF 586252db9974d82bdac40f0bad24e035.exe File opened for modification \??\c:\AUTORUN.INF 586252db9974d82bdac40f0bad24e035.exe File created \??\f:\AUTORUN.INF 586252db9974d82bdac40f0bad24e035.exe File opened for modification \??\f:\AUTORUN.INF 586252db9974d82bdac40f0bad24e035.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\dllcache\linkinfo.dll 586252db9974d82bdac40f0bad24e035.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\ALKS.pif 586252db9974d82bdac40f0bad24e035.exe File opened for modification C:\Program Files\ALKS.pif 586252db9974d82bdac40f0bad24e035.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Fonts\sisl.fon rundll32.exe File created C:\Windows\fonts\alskg.sys 586252db9974d82bdac40f0bad24e035.exe File created C:\Windows\fonts\naks.sys 586252db9974d82bdac40f0bad24e035.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4660 sc.exe 1532 sc.exe 3668 sc.exe 4544 sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 972 ALKS.pif 972 ALKS.pif 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe 4256 586252db9974d82bdac40f0bad24e035.exe -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 3264 rundll32.exe 656 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4256 586252db9974d82bdac40f0bad24e035.exe Token: SeDebugPrivilege 4256 586252db9974d82bdac40f0bad24e035.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4256 wrote to memory of 972 4256 586252db9974d82bdac40f0bad24e035.exe 75 PID 4256 wrote to memory of 972 4256 586252db9974d82bdac40f0bad24e035.exe 75 PID 4256 wrote to memory of 972 4256 586252db9974d82bdac40f0bad24e035.exe 75 PID 972 wrote to memory of 772 972 ALKS.pif 94 PID 972 wrote to memory of 772 972 ALKS.pif 94 PID 972 wrote to memory of 772 972 ALKS.pif 94 PID 772 wrote to memory of 3264 772 cmd.exe 95 PID 772 wrote to memory of 3264 772 cmd.exe 95 PID 772 wrote to memory of 3264 772 cmd.exe 95 PID 4256 wrote to memory of 4032 4256 586252db9974d82bdac40f0bad24e035.exe 114 PID 4256 wrote to memory of 4032 4256 586252db9974d82bdac40f0bad24e035.exe 114 PID 4256 wrote to memory of 4032 4256 586252db9974d82bdac40f0bad24e035.exe 114 PID 4256 wrote to memory of 2932 4256 586252db9974d82bdac40f0bad24e035.exe 113 PID 4256 wrote to memory of 2932 4256 586252db9974d82bdac40f0bad24e035.exe 113 PID 4256 wrote to memory of 2932 4256 586252db9974d82bdac40f0bad24e035.exe 113 PID 4256 wrote to memory of 3192 4256 586252db9974d82bdac40f0bad24e035.exe 112 PID 4256 wrote to memory of 3192 4256 586252db9974d82bdac40f0bad24e035.exe 112 PID 4256 wrote to memory of 3192 4256 586252db9974d82bdac40f0bad24e035.exe 112 PID 4256 wrote to memory of 944 4256 586252db9974d82bdac40f0bad24e035.exe 106 PID 4256 wrote to memory of 944 4256 586252db9974d82bdac40f0bad24e035.exe 106 PID 4256 wrote to memory of 944 4256 586252db9974d82bdac40f0bad24e035.exe 106 PID 4256 wrote to memory of 4212 4256 586252db9974d82bdac40f0bad24e035.exe 107 PID 4256 wrote to memory of 4212 4256 586252db9974d82bdac40f0bad24e035.exe 107 PID 4256 wrote to memory of 4212 4256 586252db9974d82bdac40f0bad24e035.exe 107 PID 4032 wrote to memory of 5080 4032 cmd.exe 115 PID 4032 wrote to memory of 5080 4032 cmd.exe 115 PID 4032 wrote to memory of 5080 4032 cmd.exe 115 PID 2932 wrote to memory of 4544 2932 cmd.exe 119 PID 2932 wrote to memory of 4544 2932 cmd.exe 119 PID 2932 wrote to memory of 4544 2932 cmd.exe 119 PID 3192 wrote to memory of 3668 3192 cmd.exe 118 PID 3192 wrote to memory of 3668 3192 cmd.exe 118 PID 3192 wrote to memory of 3668 3192 cmd.exe 118 PID 944 wrote to memory of 1532 944 cmd.exe 117 PID 944 wrote to memory of 1532 944 cmd.exe 117 PID 944 wrote to memory of 1532 944 cmd.exe 117 PID 4212 wrote to memory of 4660 4212 cmd.exe 116 PID 4212 wrote to memory of 4660 4212 cmd.exe 116 PID 4212 wrote to memory of 4660 4212 cmd.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\586252db9974d82bdac40f0bad24e035.exe"C:\Users\Admin\AppData\Local\Temp\586252db9974d82bdac40f0bad24e035.exe"1⤵
- Sets file execution options in registry
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Program Files\ALKS.pif"C:\Program Files\ALKS.pif"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\cmd.execmd /c rundll32 Runt.dll,RundllTest3⤵
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\rundll32.exerundll32 Runt.dll,RundllTest4⤵
- Sets service image path in registry
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: LoadsDriver
PID:3264
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc delete RavTask2⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\sc.exesc delete RavTask3⤵
- Launches sc.exe
PID:1532
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc delete RsRavMon2⤵
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\sc.exesc delete RsRavMon3⤵
- Launches sc.exe
PID:4660
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc delete RsScanSrv2⤵
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\sc.exesc delete RsScanSrv3⤵
- Launches sc.exe
PID:3668
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc delete RavCCenter2⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\sc.exesc delete RavCCenter3⤵
- Launches sc.exe
PID:4544
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net1 start server2⤵
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\net1.exenet1 start server3⤵PID:5080
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5719d9731f35ca29232ef7ef22e887adc
SHA138cca1dc95cbd0d47a81afcecc3403ebc97cf377
SHA2567ef11877c1f9b55c5102fec725f787261f0cfe6bfff82e706abc7e1d5a0f9b41
SHA51279c2d70ccb1864db3cbd0c1ef2218a4420389c1cf20fa11b454d2680fec59a3018aff128048144f547a4601af60bb95dcf7c8d7a883b9d819ac644dba7433221
-
Filesize
7KB
MD567a39bd5018bf39f7afcebe1b4ff52ad
SHA1af6714aca06dd7cd0415fb9ebcd60956e95a0db2
SHA256e643ed74269304086bc72b617e0ab6368b97f07805bd6eae5e005a349b23ed98
SHA51276387db26dd39499595ad7b0674f624488b01dc47c5edb1e22fa5731f43edfb5b752a9a52a6b737bee0471eb2cf07a8dd4f479fa5b26d8a8f2822bf6b214efa5
-
Filesize
9KB
MD515acf079ff53fbad800c4121c6497ecb
SHA17f47b91ddfb4cc3dbfe319123de0d047dcc9fcfd
SHA256f06259a419908a3e49c7abd53bb69c5a389d81706a6f1c5e50c6445d1d86eff1
SHA512231514576a14e51140e815e5206a36f6836037b5cfdc37b123d445ee87ca314db09c7b30b6d7fe229d1e7bfc7cf9b39c9c27dd0e6f7a89d022c5c1b96aaae281