Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-01-2024 05:04
Static task
static1
Behavioral task
behavioral1
Sample
6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe
Resource
win10v2004-20231215-en
General
-
Target
6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe
-
Size
7.1MB
-
MD5
460ad51c283bf0d1fdf8f49ff13e104b
-
SHA1
a525d26607b13a0eeed7ce027ad3f7bf920111d2
-
SHA256
6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba
-
SHA512
425c993170885e496120e177285a13ac76d2e982f987ebf91cc8b91bc614d76f1624935e61cd1913723dab6ad652cf23609d2b8c5dc6cebc63981de61918c004
-
SSDEEP
196608:GmWgOGj3+UtqxMrp+2f4f3D1K+tHG7wv7ew:PsGj3kMrp+2f4PpKsHGs7
Malware Config
Extracted
smokeloader
up3
Extracted
fabookie
http://app.alie3ksgaa.com/check/safe
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
Detect Fabookie payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2772-151-0x0000000003540000-0x0000000003670000-memory.dmp family_fabookie behavioral1/memory/2772-181-0x0000000003540000-0x0000000003670000-memory.dmp family_fabookie -
Glupteba payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/3000-153-0x0000000002C80000-0x000000000356B000-memory.dmp family_glupteba behavioral1/memory/3000-156-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3000-160-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3000-162-0x0000000002C80000-0x000000000356B000-memory.dmp family_glupteba behavioral1/memory/692-183-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/692-192-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/844-251-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/844-382-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Modifies firewall policy service 2 TTPs 8 IoCs
Processes:
k393q3k111o_1.exeexplorer.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" k393q3k111o_1.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile k393q3k111o_1.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" k393q3k111o_1.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile k393q3k111o_1.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
regedit.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\ImagePath regedit.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Processes:
e0cbefcb1af40c7d4aff4aca26621a98.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\e0cbefcb1af40c7d4aff4aca26621a98.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe -
Enumerates VirtualBox registry keys 2 TTPs 10 IoCs
Processes:
k393q3k111o_1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VBoxGuest k393q3k111o_1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VBoxService k393q3k111o_1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VBoxVideo k393q3k111o_1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VBoxVideo k393q3k111o_1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VBoxGuest k393q3k111o_1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VBoxMouse k393q3k111o_1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VBoxMouse k393q3k111o_1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VBoxService k393q3k111o_1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VBoxSF k393q3k111o_1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VBoxSF k393q3k111o_1.exe -
Modifies boot configuration data using bcdedit 14 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 2736 bcdedit.exe 1564 bcdedit.exe 960 bcdedit.exe 996 bcdedit.exe 2424 bcdedit.exe 1800 bcdedit.exe 2164 bcdedit.exe 2440 bcdedit.exe 1632 bcdedit.exe 912 bcdedit.exe 2428 bcdedit.exe 1312 bcdedit.exe 2444 bcdedit.exe 1620 bcdedit.exe -
Disables taskbar notifications via registry modification
-
Disables use of System Restore points 1 TTPs
-
Looks for VMWare services registry key. 1 TTPs 1 IoCs
Processes:
BroomSetup.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware BroomSetup.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
Sets file execution options in registry 2 TTPs 20 IoCs
Processes:
FF17.exek393q3k111o_1.exeregedit.exeexplorer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\k393q3k111o.exe FF17.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\k393q3k111o.exe\DisableExceptionChainValidation FF17.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbamgui.exe k393q3k111o_1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Mrtstub.exe k393q3k111o_1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Mrtstub.exe\Debugger = "pcoqssc.exe" k393q3k111o_1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MRT.exe k393q3k111o_1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MRT.exe\Debugger = "whonsyszcfw.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "wwx.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbamgui.exe\Debugger = "wrjrgmj.exe" k393q3k111o_1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbam.exe k393q3k111o_1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winmgr108.exe k393q3k111o_1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbam.exe\Debugger = "avfdsqr.exe" k393q3k111o_1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MRT.exe\Debugger = "isczvxy.exe" k393q3k111o_1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "okrusuzpbpk.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MRT.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Mrtstub.exe\Debugger = "miahuyszddt.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mrtstub.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winmgr108.exe\Debugger = "lskmrwx.exe" k393q3k111o_1.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
regedit.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\ImagePath regedit.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorer.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe -
Executes dropped EXE 10 IoCs
Processes:
InstallSetup8.exerty27.exetoolspub2.exee0cbefcb1af40c7d4aff4aca26621a98.exeBroomSetup.exee0cbefcb1af40c7d4aff4aca26621a98.execsrss.exeFF17.exe926.exek393q3k111o_1.exepid process 2340 InstallSetup8.exe 2772 rty27.exe 2720 toolspub2.exe 3000 e0cbefcb1af40c7d4aff4aca26621a98.exe 2788 BroomSetup.exe 692 e0cbefcb1af40c7d4aff4aca26621a98.exe 844 csrss.exe 2820 FF17.exe 1660 926.exe 1180 k393q3k111o_1.exe -
Loads dropped DLL 24 IoCs
Processes:
6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exeInstallSetup8.exee0cbefcb1af40c7d4aff4aca26621a98.exepatch.exeWerFault.exeexplorer.exepid process 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe 2340 InstallSetup8.exe 2340 InstallSetup8.exe 2340 InstallSetup8.exe 692 e0cbefcb1af40c7d4aff4aca26621a98.exe 692 e0cbefcb1af40c7d4aff4aca26621a98.exe 2340 InstallSetup8.exe 2404 patch.exe 2404 patch.exe 2404 patch.exe 2404 patch.exe 2404 patch.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 2372 explorer.exe 2404 patch.exe 2404 patch.exe 2404 patch.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
e0cbefcb1af40c7d4aff4aca26621a98.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\e0cbefcb1af40c7d4aff4aca26621a98.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
e0cbefcb1af40c7d4aff4aca26621a98.exeexplorer.exeBroomSetup.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Java Updater = "C:\\ProgramData\\Java Updater\\k393q3k111o.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Updater = "\"C:\\ProgramData\\Java Updater\\k393q3k111o.exe\"" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Updater = "\"C:\\ProgramData\\Java Updater\\k393q3k111o.exe\"" BroomSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks for any installed AV software in registry 1 TTPs 2 IoCs
Processes:
k393q3k111o_1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\AntiVirService k393q3k111o_1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\avast! Antivirus k393q3k111o_1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
FF17.exeBroomSetup.exek393q3k111o_1.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FF17.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BroomSetup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA k393q3k111o_1.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
explorer.exedescription ioc process File opened for modification C:\ProgramData\Java Updater\desktop.ini explorer.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 api.ipify.org -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
BroomSetup.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum BroomSetup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 BroomSetup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
Processes:
FF17.exeexplorer.exeBroomSetup.exek393q3k111o_1.exepid process 2820 FF17.exe 2372 explorer.exe 2372 explorer.exe 2372 explorer.exe 2372 explorer.exe 2372 explorer.exe 2372 explorer.exe 2372 explorer.exe 2788 BroomSetup.exe 2788 BroomSetup.exe 2788 BroomSetup.exe 2788 BroomSetup.exe 2372 explorer.exe 2372 explorer.exe 2372 explorer.exe 1180 k393q3k111o_1.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
e0cbefcb1af40c7d4aff4aca26621a98.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN e0cbefcb1af40c7d4aff4aca26621a98.exe -
Drops file in Windows directory 3 IoCs
Processes:
makecab.exee0cbefcb1af40c7d4aff4aca26621a98.exedescription ioc process File created C:\Windows\Logs\CBS\CbsPersist_20240122050531.cab makecab.exe File opened for modification C:\Windows\rss e0cbefcb1af40c7d4aff4aca26621a98.exe File created C:\Windows\rss\csrss.exe e0cbefcb1af40c7d4aff4aca26621a98.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2380 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2076 2340 WerFault.exe InstallSetup8.exe -
NSIS installer 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\926.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\926.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\926.exe nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
toolspub2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
FF17.exeexplorer.exek393q3k111o_1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString FF17.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 k393q3k111o_1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString k393q3k111o_1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 FF17.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2244 schtasks.exe 2928 schtasks.exe 1484 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS explorer.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" explorer.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" explorer.exe -
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main explorer.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
e0cbefcb1af40c7d4aff4aca26621a98.execsrss.exewindefender.exenetsh.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-501 = "Nepal Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-162 = "Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-71 = "Newfoundland Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-201 = "US Mountain Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-191 = "Mountain Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-448 = "Azerbaijan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-42 = "E. South America Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-491 = "India Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-961 = "Paraguay Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-101 = "Provides DHCP based enforcement for NAP" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-551 = "North Asia Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-161 = "Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-271 = "Greenwich Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-431 = "Iran Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-364 = "Middle East Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-1042 = "Ulaanbaatar Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-522 = "N. Central Asia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-561 = "SE Asia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-632 = "Tokyo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-401 = "Arabic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-662 = "Cen. Australia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-335 = "Jordan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-100 = "EAP Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-442 = "Arabian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-251 = "Dateline Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-112 = "Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-832 = "SA Eastern Standard Time" windefender.exe -
Processes:
rty27.execsrss.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 rty27.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 rty27.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 rty27.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 rty27.exe -
NTFS ADS 2 IoCs
Processes:
explorer.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\k393q3k111o_1.exe:1BB7FB68 explorer.exe File created C:\Users\Admin\AppData\Local\Temp\k393q3k111o_1.exe:1BB7FB68 explorer.exe -
Runs regedit.exe 1 IoCs
Processes:
regedit.exepid process 1944 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
toolspub2.exee0cbefcb1af40c7d4aff4aca26621a98.exeExplorer.EXEpid process 2720 toolspub2.exe 2720 toolspub2.exe 3000 e0cbefcb1af40c7d4aff4aca26621a98.exe 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 468 -
Suspicious behavior: MapViewOfSection 14 IoCs
Processes:
toolspub2.exeFF17.exeexplorer.exek393q3k111o_1.exepid process 2720 toolspub2.exe 2820 FF17.exe 2820 FF17.exe 2372 explorer.exe 2372 explorer.exe 2372 explorer.exe 2372 explorer.exe 2372 explorer.exe 2372 explorer.exe 2372 explorer.exe 2372 explorer.exe 2372 explorer.exe 1180 k393q3k111o_1.exe 1180 k393q3k111o_1.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
e0cbefcb1af40c7d4aff4aca26621a98.exeFF17.exeexplorer.exeExplorer.EXEk393q3k111o_1.exeregedit.exesc.exedescription pid process Token: SeDebugPrivilege 3000 e0cbefcb1af40c7d4aff4aca26621a98.exe Token: SeImpersonatePrivilege 3000 e0cbefcb1af40c7d4aff4aca26621a98.exe Token: SeDebugPrivilege 2820 FF17.exe Token: SeRestorePrivilege 2820 FF17.exe Token: SeBackupPrivilege 2820 FF17.exe Token: SeLoadDriverPrivilege 2820 FF17.exe Token: SeCreatePagefilePrivilege 2820 FF17.exe Token: SeShutdownPrivilege 2820 FF17.exe Token: SeTakeOwnershipPrivilege 2820 FF17.exe Token: SeChangeNotifyPrivilege 2820 FF17.exe Token: SeCreateTokenPrivilege 2820 FF17.exe Token: SeMachineAccountPrivilege 2820 FF17.exe Token: SeSecurityPrivilege 2820 FF17.exe Token: SeAssignPrimaryTokenPrivilege 2820 FF17.exe Token: SeCreateGlobalPrivilege 2820 FF17.exe Token: 33 2820 FF17.exe Token: SeDebugPrivilege 2372 explorer.exe Token: SeRestorePrivilege 2372 explorer.exe Token: SeBackupPrivilege 2372 explorer.exe Token: SeLoadDriverPrivilege 2372 explorer.exe Token: SeCreatePagefilePrivilege 2372 explorer.exe Token: SeShutdownPrivilege 2372 explorer.exe Token: SeTakeOwnershipPrivilege 2372 explorer.exe Token: SeChangeNotifyPrivilege 2372 explorer.exe Token: SeCreateTokenPrivilege 2372 explorer.exe Token: SeMachineAccountPrivilege 2372 explorer.exe Token: SeSecurityPrivilege 2372 explorer.exe Token: SeAssignPrimaryTokenPrivilege 2372 explorer.exe Token: SeCreateGlobalPrivilege 2372 explorer.exe Token: 33 2372 explorer.exe Token: SeShutdownPrivilege 1316 Explorer.EXE Token: SeDebugPrivilege 1180 k393q3k111o_1.exe Token: SeRestorePrivilege 1180 k393q3k111o_1.exe Token: SeBackupPrivilege 1180 k393q3k111o_1.exe Token: SeLoadDriverPrivilege 1180 k393q3k111o_1.exe Token: SeCreatePagefilePrivilege 1180 k393q3k111o_1.exe Token: SeShutdownPrivilege 1180 k393q3k111o_1.exe Token: SeTakeOwnershipPrivilege 1180 k393q3k111o_1.exe Token: SeChangeNotifyPrivilege 1180 k393q3k111o_1.exe Token: SeCreateTokenPrivilege 1180 k393q3k111o_1.exe Token: SeMachineAccountPrivilege 1180 k393q3k111o_1.exe Token: SeSecurityPrivilege 1180 k393q3k111o_1.exe Token: SeAssignPrimaryTokenPrivilege 1180 k393q3k111o_1.exe Token: SeCreateGlobalPrivilege 1180 k393q3k111o_1.exe Token: 33 1180 k393q3k111o_1.exe Token: SeCreatePagefilePrivilege 1180 k393q3k111o_1.exe Token: SeCreatePagefilePrivilege 1180 k393q3k111o_1.exe Token: SeCreatePagefilePrivilege 1180 k393q3k111o_1.exe Token: SeCreatePagefilePrivilege 1180 k393q3k111o_1.exe Token: SeCreatePagefilePrivilege 1180 k393q3k111o_1.exe Token: SeDebugPrivilege 1944 regedit.exe Token: SeRestorePrivilege 1944 regedit.exe Token: SeBackupPrivilege 1944 regedit.exe Token: SeLoadDriverPrivilege 1944 regedit.exe Token: SeCreatePagefilePrivilege 1944 regedit.exe Token: SeShutdownPrivilege 1944 regedit.exe Token: SeTakeOwnershipPrivilege 1944 regedit.exe Token: SeChangeNotifyPrivilege 1944 regedit.exe Token: SeCreateTokenPrivilege 1944 regedit.exe Token: SeMachineAccountPrivilege 1944 regedit.exe Token: SeSecurityPrivilege 1944 regedit.exe Token: SeAssignPrimaryTokenPrivilege 1944 regedit.exe Token: SeCreateGlobalPrivilege 1944 regedit.exe Token: SeSecurityPrivilege 2380 sc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
BroomSetup.exepid process 2788 BroomSetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exeInstallSetup8.exee0cbefcb1af40c7d4aff4aca26621a98.execmd.exeExplorer.EXEFF17.exeexplorer.exedescription pid process target process PID 2092 wrote to memory of 2340 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe InstallSetup8.exe PID 2092 wrote to memory of 2340 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe InstallSetup8.exe PID 2092 wrote to memory of 2340 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe InstallSetup8.exe PID 2092 wrote to memory of 2340 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe InstallSetup8.exe PID 2092 wrote to memory of 2340 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe InstallSetup8.exe PID 2092 wrote to memory of 2340 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe InstallSetup8.exe PID 2092 wrote to memory of 2340 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe InstallSetup8.exe PID 2092 wrote to memory of 2772 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe rty27.exe PID 2092 wrote to memory of 2772 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe rty27.exe PID 2092 wrote to memory of 2772 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe rty27.exe PID 2092 wrote to memory of 2772 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe rty27.exe PID 2092 wrote to memory of 2720 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe toolspub2.exe PID 2092 wrote to memory of 2720 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe toolspub2.exe PID 2092 wrote to memory of 2720 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe toolspub2.exe PID 2092 wrote to memory of 2720 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe toolspub2.exe PID 2092 wrote to memory of 3000 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe e0cbefcb1af40c7d4aff4aca26621a98.exe PID 2092 wrote to memory of 3000 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe e0cbefcb1af40c7d4aff4aca26621a98.exe PID 2092 wrote to memory of 3000 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe e0cbefcb1af40c7d4aff4aca26621a98.exe PID 2092 wrote to memory of 3000 2092 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe e0cbefcb1af40c7d4aff4aca26621a98.exe PID 2340 wrote to memory of 2788 2340 InstallSetup8.exe BroomSetup.exe PID 2340 wrote to memory of 2788 2340 InstallSetup8.exe BroomSetup.exe PID 2340 wrote to memory of 2788 2340 InstallSetup8.exe BroomSetup.exe PID 2340 wrote to memory of 2788 2340 InstallSetup8.exe BroomSetup.exe PID 2340 wrote to memory of 2788 2340 InstallSetup8.exe BroomSetup.exe PID 2340 wrote to memory of 2788 2340 InstallSetup8.exe BroomSetup.exe PID 2340 wrote to memory of 2788 2340 InstallSetup8.exe BroomSetup.exe PID 692 wrote to memory of 2264 692 e0cbefcb1af40c7d4aff4aca26621a98.exe cmd.exe PID 692 wrote to memory of 2264 692 e0cbefcb1af40c7d4aff4aca26621a98.exe cmd.exe PID 692 wrote to memory of 2264 692 e0cbefcb1af40c7d4aff4aca26621a98.exe cmd.exe PID 692 wrote to memory of 2264 692 e0cbefcb1af40c7d4aff4aca26621a98.exe cmd.exe PID 2264 wrote to memory of 1700 2264 cmd.exe netsh.exe PID 2264 wrote to memory of 1700 2264 cmd.exe netsh.exe PID 2264 wrote to memory of 1700 2264 cmd.exe netsh.exe PID 692 wrote to memory of 844 692 e0cbefcb1af40c7d4aff4aca26621a98.exe csrss.exe PID 692 wrote to memory of 844 692 e0cbefcb1af40c7d4aff4aca26621a98.exe csrss.exe PID 692 wrote to memory of 844 692 e0cbefcb1af40c7d4aff4aca26621a98.exe csrss.exe PID 692 wrote to memory of 844 692 e0cbefcb1af40c7d4aff4aca26621a98.exe csrss.exe PID 1316 wrote to memory of 2820 1316 Explorer.EXE FF17.exe PID 1316 wrote to memory of 2820 1316 Explorer.EXE FF17.exe PID 1316 wrote to memory of 2820 1316 Explorer.EXE FF17.exe PID 1316 wrote to memory of 2820 1316 Explorer.EXE FF17.exe PID 2820 wrote to memory of 2372 2820 FF17.exe explorer.exe PID 2820 wrote to memory of 2372 2820 FF17.exe explorer.exe PID 2820 wrote to memory of 2372 2820 FF17.exe explorer.exe PID 2820 wrote to memory of 2372 2820 FF17.exe explorer.exe PID 2820 wrote to memory of 2372 2820 FF17.exe explorer.exe PID 2820 wrote to memory of 2372 2820 FF17.exe explorer.exe PID 2820 wrote to memory of 2372 2820 FF17.exe explorer.exe PID 1316 wrote to memory of 1660 1316 Explorer.EXE 926.exe PID 1316 wrote to memory of 1660 1316 Explorer.EXE 926.exe PID 1316 wrote to memory of 1660 1316 Explorer.EXE 926.exe PID 1316 wrote to memory of 1660 1316 Explorer.EXE 926.exe PID 2372 wrote to memory of 1260 2372 explorer.exe Dwm.exe PID 2372 wrote to memory of 1260 2372 explorer.exe Dwm.exe PID 2372 wrote to memory of 1260 2372 explorer.exe Dwm.exe PID 2372 wrote to memory of 1260 2372 explorer.exe Dwm.exe PID 2372 wrote to memory of 1260 2372 explorer.exe Dwm.exe PID 2372 wrote to memory of 1260 2372 explorer.exe Dwm.exe PID 2372 wrote to memory of 1316 2372 explorer.exe Explorer.EXE PID 2372 wrote to memory of 1316 2372 explorer.exe Explorer.EXE PID 2372 wrote to memory of 1316 2372 explorer.exe Explorer.EXE PID 2372 wrote to memory of 1316 2372 explorer.exe Explorer.EXE PID 2372 wrote to memory of 1316 2372 explorer.exe Explorer.EXE PID 2372 wrote to memory of 1316 2372 explorer.exe Explorer.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1260
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe"C:\Users\Admin\AppData\Local\Temp\6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe4⤵
- Looks for VMWare services registry key.
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 5204⤵
- Loads dropped DLL
- Program crash
PID:2076
-
-
-
C:\Users\Admin\AppData\Local\Temp\rty27.exe"C:\Users\Admin\AppData\Local\Temp\rty27.exe"3⤵
- Executes dropped EXE
- Modifies system certificate store
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:1700
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies data under HKEY_USERS
- Modifies system certificate store
PID:844 -
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:1484
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"6⤵
- Loads dropped DLL
PID:2404 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER7⤵
- Modifies boot configuration data using bcdedit
PID:2736
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:7⤵
- Modifies boot configuration data using bcdedit
PID:1564
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:7⤵
- Modifies boot configuration data using bcdedit
PID:960
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows7⤵
- Modifies boot configuration data using bcdedit
PID:996
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe7⤵
- Modifies boot configuration data using bcdedit
PID:2424
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe7⤵
- Modifies boot configuration data using bcdedit
PID:1800
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 07⤵
- Modifies boot configuration data using bcdedit
PID:2164
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn7⤵
- Modifies boot configuration data using bcdedit
PID:2440
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 17⤵
- Modifies boot configuration data using bcdedit
PID:1632
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}7⤵
- Modifies boot configuration data using bcdedit
PID:912
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast7⤵
- Modifies boot configuration data using bcdedit
PID:2428
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 07⤵
- Modifies boot configuration data using bcdedit
PID:1312
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}7⤵
- Modifies boot configuration data using bcdedit
PID:2444
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵PID:1052
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v6⤵
- Modifies boot configuration data using bcdedit
PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exeC:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe6⤵PID:2984
-
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:2928
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵PID:2008
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:1148
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\FF17.exeC:\Users\Admin\AppData\Local\Temp\FF17.exe2⤵
- Sets file execution options in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Modifies firewall policy service
- Sets file execution options in registry
- Checks BIOS information in registry
- Loads dropped DLL
- Adds Run key to start application
- Drops desktop.ini file(s)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- NTFS ADS
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\k393q3k111o_1.exe/suac4⤵
- Modifies firewall policy service
- Enumerates VirtualBox registry keys
- Sets file execution options in registry
- Executes dropped EXE
- Checks for any installed AV software in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1180 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\SysWOW64\regedit.exe"5⤵
- Modifies security service
- Sets file execution options in registry
- Sets service image path in registry
- Runs regedit.exe
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /SC ONLOGON /TN "Windows Update Check - 0x1BB70478" /TR "C:\PROGRA~3\JAVAUP~1\K393Q3~1.EXE" /RL HIGHEST5⤵
- Creates scheduled task(s)
PID:2244
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\926.exeC:\Users\Admin\AppData\Local\Temp\926.exe2⤵
- Executes dropped EXE
PID:1660
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1928
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240122050531.log C:\Windows\Logs\CBS\CbsPersist_20240122050531.cab1⤵
- Drops file in Windows directory
PID:3060
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Modifies data under HKEY_USERS
PID:2864
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Defense Evasion
Impair Defenses
3Disable or Modify Tools
2Modify Registry
11Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5881b9011db361c67329672f46c30112d
SHA16d7fdefe0228da4b2b3ced63d165b8d72835246d
SHA256fe6be9d311e98204a708342fee4854ba4a1731abc90bd1ab098ed9be91c5dd43
SHA5121feacb1016bb56529348c66ad9e1f2de5f091de20469db3c0128aba4a3b825b42849087d62fd84231061267731e6a6604aafb2c8a70102e4e2e63916957daa4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544a1dd4166c17bfab94e5f79cdaad458
SHA1efb5fda1fa36d9699da76e4f93e7c24bd247c3e2
SHA2569c9ebcf2984768e98ca855fbf1ee598edc95225306359a3e493a7310a6bfd451
SHA512ce43f4e112d6f9c21afbd8ee9864c1336828b36098c54c3c770218108722bbce516996abb007ce1d058315ec4861ab1e7cdd6152f14b268a4beae6746a89b257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5fc2f80917590a92a9e9609b5ba7d833a
SHA1583ac21c7f448f127d41c3a5a9812395ef7a678d
SHA25664d9a8fd489d649bb54c03c638004068d192c9ea55e68a18133931c67f23ce81
SHA512e00e467543078e41eb807e3900e0cd044e08f602989907a62300d2e77b72015e185e92d6bd70c7c6b25841d890061e0b8d0edb1b878d8dca7fee4dad0305b8ab
-
Filesize
3.1MB
MD5d312e467ce1e7ee92549bcbaeefb2216
SHA1b06bd4b2dade34607f7da86c669cb47a32057977
SHA256799774245990b96279fbe05c27b55bf7c3e113e8073e9a16884395bd81cb3610
SHA51273e60b916d4411add67e67cb4fb730c6ec87452e8a310f0d0ecd8a89c3815a9c540098f51efc63631fe2f13168991526f8eac6527badd55df860f601aae7e55e
-
Filesize
8KB
MD5cdb0c664b059dc739bf1975f0ee209f8
SHA13978cb07c43bb640133113893c0ce5b4dca42a1f
SHA2567062164d5ac90d3347c1b0c3ed9f1904309a885357c26ce703f48d993ca11c20
SHA512eb3d0483d1f8a741cb379b3989ba4becda0fa9a39084cd2c0d506afb3aca13ec3ce04e36c6251ecae19fc87776b8438df15f26bddbc720c4b6f0faaefa1a2084
-
Filesize
2.4MB
MD56866616dc304e3317f0af20954c92692
SHA1d15374b11b87e8443d9ea9472b70e396c54a999d
SHA25689ca7592e762cb4cc1ffeb88a7ff815fb68a2966f449736f8a50b874047c20c3
SHA51286d87cabf28af643933af6de30ecda3564160f5547f46686402e6b90d212c7a87d2764a7b01a455930199ca53c8e9504610eb479d6cd181a427bedefc6eb3b4b
-
Filesize
173KB
MD5ccc7c2673398437e40f42ec37f268dad
SHA146dac316b61a6220a5ca429cff398587920b79b9
SHA25697aae1400d856d440b0c81ef83a852899dbfb85eb17eb33b54f7de72d6ae6a2e
SHA5124fae47e7f305ada803e436cab4f415b1e3b21f89cd32d15722b90afa9a720e6e739794275beca675184e65515be52640c3ade70aa46e5d5cfbf5bde3a13b5196
-
Filesize
683KB
MD5258599b5db84b0c2c89d1d3ab8bb3dd3
SHA1d3b17552efa7978118c29eaf005fecf57e3b8aa4
SHA256604bd0d7e4203cfc43e152a25875b390a2caf7fab2c7c50377fc703f2df5895f
SHA512a985690e76236236b4cca7d8aae6ee82acd5ff61000f80bc8e09ca779990d13df3cfea6a9b5be6bae36cacf90740287b190f8e0010b6d0375d2f5d0541efe3fa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
360KB
MD580c413180b6bd0dd664adc4e0665b494
SHA1e791e4a3391fc6b7bcb58399cd4fa3c52a06b940
SHA2566d99cec56614b6b8a23dfa84a50c6bbfde535411c6366ac2bcc20c9f5af62880
SHA512347f4ae6f308b37d055a6177478e45ab3838d7020abed70c7aa138d2c3771e709de204da8550aebdcaa6139d869dc7328cc7e645c4dd48d1066f9ad70225644a
-
Filesize
475KB
MD58f66828fb3728b04dacc83102ed4e8dc
SHA1331cf0b92006dd068d826b07d36b2475d948df8e
SHA2560f956e486bce0076077890d371636371dd0565a623c0f0574ac78f6932fe683f
SHA51262b8cd785a4646b691328c43495ed6d62ca257f32b800ca55d53705f6f8e0e4bcad52dec2b45d493be6cc0a0df0e7a436dae0468cb8b17a9fe87011beeb321a6
-
Filesize
724KB
MD5fb51b47f36a4018659624c961c6ebe8b
SHA1e7349ea508ec60086da235f2f833f161fc1bfc1a
SHA256276c1061b1de83f7386c08d9b049e88738ed47fdfee0dc9d6e08eedfe6545bed
SHA512c8ec4a4ef3798d96c13da5855836b6df11be958f898f6336aecac77d2da05cc4556a71fb064b370557b267f6dd5b839aad5ff9c78c59165c58f02d635fa8e91b
-
C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error
Filesize1.9MB
MD58664a3f54de3eb5b1a8ae693363f33e3
SHA14d90f35812fcde7f93a5503c8ea930a35c7428ce
SHA256af3d05f7e8672c2550e61182ac2602a7503f4f95df29dc731829c57e47dbbc68
SHA5127b68840b388e0e5dddd801f726b02047f1224e53dc4b027b8fa1ba8bc1d4f5640692731e0f312bb8e61d30a23e06da01c29ac3fc8c4780c02756b7b845fff92d
-
C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error
Filesize395KB
MD55da3a881ef991e8010deed799f1a5aaf
SHA1fea1acea7ed96d7c9788783781e90a2ea48c1a53
SHA256f18fdb9e03546bfb98397bcb8378b505eaf4ac061749229a7ee92a1c3cf156e4
SHA51224fbcb5353a3d51ee01f1de1bbb965f9e40e0d00e52c42713d446f12edceeb8d08b086a8687a6188decaa8f256899e24a06c424d8d73adaad910149a9c45ef09
-
Filesize
11KB
MD582be5fe42792201dd5a901ebe12bba2d
SHA13dd745d6d022283628b01a67a2312d1e5648a5bd
SHA2568ab300f12b28732f9e2648fed9efe68f287408672fd14c6bba1e24e72cde11c0
SHA5128dfce038d015b20009a3a6c962ac095a51f70b3a9f9dd3960ebb5646fc81fa4773761f50b2a733978fd5db347e6c724945386b5b8cb4ffad7cc0cf90f89edf6d
-
Filesize
4.1MB
MD56fd15032c68ab45af5da2f585e37e6e3
SHA1b2cb11289b5c90e0feb32be9782475297acca2f6
SHA25622ad7d2ac9ade5c5c25e030fa5d76d62dff95c5cb550a8c71433c31348aabd04
SHA512ad4f3d163b4287ddcb185934ee309536edb858024a48a2c824da7fe5e2b9512f4b4e7dd4ac085fb0fc7df27dd7bf77647c72a48038f6f11e8a9d1e6d9e4ec30f
-
Filesize
1.9MB
MD5811ea300eabbd6012cd713cd9a8f3703
SHA12a9c6c7605d319bb04908f3d5ef95ebfcfad3fd0
SHA2563fd6db38b4514b900917e5480b7c0caacc7f44d43279feded87d751e54d255c7
SHA512be6633c3b128d82b8465b6e2a947c63539755c88b4a96d5dc8ac8259dcda9676237061c75f83220798150b9d3ea34eee83689e483585b0a191a63c0b77e96a71
-
Filesize
605KB
MD555ae2d92828f334993a7b5f91e9a746f
SHA1469b630deac32ac1bf9200f8b5b869419590e665
SHA2565466b8b40fe9a2090d758e6932bbbdd0ed71163d0af13d95756e29845921d569
SHA5128d47a4bfd319d89c6d38286c857a3e0e6a928506a76f74f69bf278d69e6259b58e7aad6f133c259a528c747f2377d7483dd8ac073b0130d93a8bfa069c69c276
-
Filesize
614KB
MD508d49abcfe230b69a5a7ead8c17f104a
SHA115b1e2033a30585ca5b663ecae9e907a174279fe
SHA256afdb3e96dc020178952abd04e1e14c39e7afc515605e2ce1092efba126d8d3df
SHA51232e6e24420c48bca94671c63192eee44b69040b9fd833f40e2c0cb51a609bb675b1153aab8f9948c94592fbb3de3c2974f7e83f52f795eb15d76c484917d5819
-
Filesize
381KB
MD5f58db50e967b2f9a7a7e51339d55f18f
SHA19322cf7de172aec8c72f7463af6ce72e4912a6b4
SHA2567ddb39bb2d1d673e0bf243a8fc2eca753fbb300e554690a5276fd93dac0c5ddf
SHA512eb48c33a12f0cd35592e238f526c08efc2a6ff17d352aab953c35f1bdba1901f1c84798c14281fac6ff40ddba4f5ad1447179a050152e5c011dc939da3aedc43
-
Filesize
591KB
MD5e2f68dc7fbd6e0bf031ca3809a739346
SHA19c35494898e65c8a62887f28e04c0359ab6f63f5
SHA256b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4
SHA51226256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579
-
Filesize
201KB
MD56aa6732f8a7ffe321b4e43d5702800e9
SHA11582c0f3d8c2f589d27d7f5c19f682bfd04e75d1
SHA2565e325be4bc51d83b75cb6e3182a8820a5f841a89b5d3e00969ce2a5f831ba5dc
SHA512456f31eac21a5435f9fbc35ddc88a8026094ad3b46a72e3f28835bf7004993b7625b56ef036456a2319cb83dfa190c087bec6dd5cb23512effe064104863c459
-
Filesize
372KB
MD5283b9a864896b1f1026e783f5a727ebe
SHA1948b0aab8b732f6ef96b15a5d03ac210b9bf3e52
SHA256661068aa546c71a7836af8c39dfcacb51890fa49cdd57247ab1cb563b4c40275
SHA512247c60dc3927a8abd04be57baac323d2fe2f1c0f8ca29801cb736c1abc2f92efe62b8065c43bf28a35d85ecec6f7f4fa888a6661708f0028ca0f1da96f68ae51
-
Filesize
111KB
MD509ec517a659746a471b68cd4ee1f6d09
SHA11b70306092cf275eae04ffc97570f523abf85e26
SHA256f1caa21cc9a636185767820d4da7e10616af6590074a60e575cd6f49270b441b
SHA5122cd5ede47f32fd15414264137832fcdb5550bca9db0d9a359df333e75aacb6be6fcf1595fb9c51704529dc868a03adc7a3197b8dc602c552ab4b8a57511df630
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
820KB
MD50076a6942db4aa3e0e65b18893df4487
SHA1a38c659cec7063b2f6b88e1c94ebc55161b5a98c
SHA256aa4f0e84c035191aada380560b1c1fc46960076c4a3982a6988e0e638ea4d6c8
SHA512913baa545cfc69fb72abcef2d1389ca611c42d2c9a7ab51e52816451c6243dac93bef6e56d7eac637a2cceeeb93750d2492cca1b6cde4192b310608d8e7eb020
-
Filesize
65KB
MD5e92808c0104c563c7a21f9fbbe1e7fac
SHA1820012ccce8e674d7219a9252439ed8763c06995
SHA256c1a3cdf8ef865a5084b13595a1174bbfa35a9e0a8bd5d0fe7afe124d2d28d86e
SHA512274c48bbbc84c008b7381d34c392078158627a8e4f03e30e04d92528c0d16a9caa1877c84771de8289ef45e6ff7272a85f87a28d381699acd834cf9e4a1d6d57
-
Filesize
82KB
MD58550213dfc875d69bfc3f6be2ee13e10
SHA1ece0f2492a8332152fc045b00f27becc90a4d29a
SHA2569d75c6b63fc81cb05084a3071c34ceb7dfe954eccb42adaba8dab3b0f9a4e9ea
SHA51265191987bdb42ad92f38f71ed9d7ac94fb79f12a56904b7cd74d32cc4bcd53ef92d5afb9420d03311836ca3a82c75379f3979975607fe8d283fb0b552ac63007
-
Filesize
25KB
MD5914571721863c312870e6d23dd5daff6
SHA1929d2d981f81e219a21dad1f3b7a1c0a5889cade
SHA25658da034e4097a88c99ec20f5119b012439479713ee5a9059bba23e39abd6a9a6
SHA512bada56921d5f00b68a6a638eb105ca47f1d1bfb4927f2516b67041ec181e76074d732e937e44348257f3914b40166ac1160517ba59257b3d6ba0806259cd50ac
-
Filesize
1.1MB
MD5db982a5002aacfadbfe7e5b9a9b5ac07
SHA15ea1e164e8a347c504aaff9ec24d8cc66abbd3c9
SHA25623aba18327b9a74638b8bcb4855ce0f2deade68bc8e0e2775765c589953eedca
SHA51233ebd93e0efbe36fdd856a25aa3579f41effcfa5ead7f8a0f8a2166c2b7a0f536cd81294a01d739692718950a6a8add08b698e0c8e21ca945bc12366c99fe7f4
-
Filesize
768KB
MD579ab1586e6c50cdc952541ac8155c4a9
SHA16acb4c0425bd9ca28ed2c8f0bfaf59acf5f661d2
SHA256f913f08cb8ff43b7a7dd4da389947eadfa1bdeed2ebd5e5332b87188df15eb93
SHA51289bd2c169cb9e9264bcad5f010d71c7d87babdc61978089b5e6763eca3bb8cf389fcd1fa19a88cbb79fc8202aa205bf5a4ca97f0b5afd900782c2ae05030db62
-
Filesize
1.1MB
MD52b26e2e32737ee25cf155b6672bb2596
SHA190e3b3b77a74809253fef3a8ff44df2f62c58588
SHA2569bce7eac73102822394c5bc205950131d18ffb3fe8825d992f134fd740a37142
SHA512eefc5e4c001a13cebb181cb89ac527005b146ae93223a5fba87c94c2f0226b624781f4993543fd262adc32ca1418ec7f3bab4404aa18387e292b3d83a5c80797
-
Filesize
507KB
MD5f41dbb5e7c7f805191d5254feec0bdab
SHA1e6de889c5fb8b35da6193ce5b464ba8470b69bb6
SHA2567eccaf65d3268934e8b8e2555b18afb1c17341349d073b4a788726c6bd4220e7
SHA512a926cac1a111f55213cc70b90a64d44f567a18735db68705f78658156508803a54abdbf07e68c376303856e837f098171dea5d11bef902e044857f20956ad5da
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
1.4MB
MD5d68625f48ac3307b4c5ef4e14363b21f
SHA1ee859d230f664492e8003f363091fae2cd963b64
SHA256f85db0ac56a6b816cc5ba72590dbad00e315f237f0a73896665baf748e8eaf15
SHA512f536f3775107eb785161320f32078ac7a6cefffb2636cc07524f0b029b710e6350d6bc8829cfd6cdfd96725edfafc6a98573148c119bc41e04da9cadd3603b88
-
Filesize
1.1MB
MD571ebed4ba701028156abb10e972c01ab
SHA12c9426db507ee54dc06b24b3ff49be2981e3314d
SHA256c5a0ae0b4481e7d8ea65be1c7c152c67f1f7b105c0206cc4e7d60bd7ddf52236
SHA5128c24fb9b3ab6ebbc2fcc63052a3b241819281eccfcfad52ce906ebd0ea995c5edcb469d0c71f1a740160a4165bc5b85fe1144d853310a89c697d622e64fb81ab
-
Filesize
1.0MB
MD556d69138c1b0ce9ecdad1d1f46008bb8
SHA10184748cc909e47b43b82d07e6719154cf9d5e02
SHA25660b13d7cfd65b7c6627699aac1305c44b3360a27185129188bd60114f671fdaf
SHA51259dac26379d191a066b8bddbd8935ee20c110683b96797725be212b5e392e4e19742c4c9e87e434cfbc9fca6e71f5b0f288c463c12cb15ffb92f6ad69ba0af5a
-
Filesize
577KB
MD564f71531a86513846094805626a832ca
SHA18fe2a5e31978f395791d3c46c45e75a68ab76bbe
SHA256718a7922039fc0805e1f39b6c90e7ce6d788c83f694893b3fe382c1f132c9441
SHA51216b6b17c0bbdfea7c1f4e378d7f2835640ab5c32c7ae360ce2c9626ceba3fe0d999b06599ba25129fc201ab128a7ec7df17da72e1f47226c5d07d12db36e9933
-
Filesize
420KB
MD5afee6eeb6863a20a615d24406e563b6c
SHA18175c07e6c4154734e0512718dc6898437f4001c
SHA2560bcbd70a1b5dbec77ffbb14aaba62202b9736fb1f77c5e48a064afc5e2ffe01a
SHA512e1ec83688bbf4916bcd7a185a0a7e03278a426bce355c14ba886d2ac20322bc073c257ba599e01af0645d1a4535ec062021f58c44bd74593cee5cf8d937b47a4
-
Filesize
163KB
MD55c399d34d8dc01741269ff1f1aca7554
SHA1e0ceed500d3cef5558f3f55d33ba9c3a709e8f55
SHA256e11e0f7804bfc485b19103a940be3d382f31c1378caca0c63076e27797d7553f
SHA5128ff9d38b22d73c595cc417427b59f5ca8e1fb7b47a2fa6aef25322bf6e614d6b71339a752d779bd736b4c1057239100ac8cc62629fd5d6556785a69bcdc3d73d
-
Filesize
624KB
MD507a1e417261e506f6c0132469a43558e
SHA13402adf86d4ef8343d2ea9f00759851e7e093266
SHA25694702d76dd471a4dece99ff6277204c0b82317bca4e5d264c37248be36d646e6
SHA51295089189080f7a7f82176faa28950627d7a9693fcbb9d9bf2f779b2cf999d120c22cd7e0997211774d4884df73d0814f68899c1b0e5a03e29c853b7866df6c0e
-
Filesize
461KB
MD5cf909cca971ac611fc61807abac546b4
SHA1e40db35e30c129c416e9f65180a976e2c3c22e5c
SHA2564fdf3328c6d5a1382e86257a8affe811cc34761c402167ce129223f132dc014b
SHA512034832d43841c1d5470b71e2bc5a27892e88480826fea9a08b758eb385a86e8cd3a3157c5884c8c7bf314ab4f0d806c5f7609cef8d192e656fc31d022bdeb60c