Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2024 05:04
Static task
static1
Behavioral task
behavioral1
Sample
6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe
Resource
win10v2004-20231215-en
General
-
Target
6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe
-
Size
7.1MB
-
MD5
460ad51c283bf0d1fdf8f49ff13e104b
-
SHA1
a525d26607b13a0eeed7ce027ad3f7bf920111d2
-
SHA256
6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba
-
SHA512
425c993170885e496120e177285a13ac76d2e982f987ebf91cc8b91bc614d76f1624935e61cd1913723dab6ad652cf23609d2b8c5dc6cebc63981de61918c004
-
SSDEEP
196608:GmWgOGj3+UtqxMrp+2f4f3D1K+tHG7wv7ew:PsGj3kMrp+2f4PpKsHGs7
Malware Config
Extracted
smokeloader
up3
Extracted
fabookie
http://app.alie3ksgaa.com/check/safe
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/3976-94-0x0000000002F60000-0x0000000003090000-memory.dmp family_fabookie behavioral2/memory/3976-170-0x0000000002F60000-0x0000000003090000-memory.dmp family_fabookie -
Glupteba payload 13 IoCs
resource yara_rule behavioral2/memory/1880-67-0x0000000002D90000-0x000000000367B000-memory.dmp family_glupteba behavioral2/memory/1880-68-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1880-133-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4004-136-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4004-169-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4004-255-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4368-303-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4368-397-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4368-409-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4368-420-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4368-425-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4368-430-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4368-435-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3544 netsh.exe -
Sets file execution options in registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\197a5css1go337.exe CC0A.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\197a5css1go337.exe\DisableExceptionChainValidation CC0A.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "uljjkuuku.exe" explorer.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation D226.exe -
Executes dropped EXE 13 IoCs
pid Process 2136 InstallSetup8.exe 3976 rty27.exe 4436 toolspub2.exe 1880 e0cbefcb1af40c7d4aff4aca26621a98.exe 4980 BroomSetup.exe 4004 e0cbefcb1af40c7d4aff4aca26621a98.exe 4368 csrss.exe 3008 CC0A.exe 3128 D226.exe 4440 WindowsUpdater.exe 3392 injector.exe 3196 windefender.exe 948 windefender.exe -
Loads dropped DLL 6 IoCs
pid Process 2136 InstallSetup8.exe 2136 InstallSetup8.exe 2136 InstallSetup8.exe 4440 WindowsUpdater.exe 4440 WindowsUpdater.exe 2136 InstallSetup8.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000a000000023244-400.dat upx behavioral2/memory/3196-405-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/948-413-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/948-428-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Java Updater = "C:\\ProgramData\\Java Updater\\197a5css1go337.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Updater = "\"C:\\ProgramData\\Java Updater\\197a5css1go337.exe\"" explorer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CC0A.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BroomSetup.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 api.ipify.org -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive WerFault.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log WerFault.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive Conhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 3008 CC0A.exe 3992 explorer.exe 3992 explorer.exe 3992 explorer.exe 3992 explorer.exe 3992 explorer.exe 3992 explorer.exe 3992 explorer.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN e0cbefcb1af40c7d4aff4aca26621a98.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe e0cbefcb1af40c7d4aff4aca26621a98.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss e0cbefcb1af40c7d4aff4aca26621a98.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3420 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 2516 4436 WerFault.exe 89 1356 3992 WerFault.exe 119 3012 2136 WerFault.exe 88 -
NSIS installer 8 IoCs
resource yara_rule behavioral2/files/0x000900000002323a-266.dat nsis_installer_2 behavioral2/files/0x000900000002323a-265.dat nsis_installer_2 behavioral2/files/0x000700000002323b-272.dat nsis_installer_1 behavioral2/files/0x000700000002323b-272.dat nsis_installer_2 behavioral2/files/0x000700000002323b-274.dat nsis_installer_1 behavioral2/files/0x000700000002323b-274.dat nsis_installer_2 behavioral2/files/0x000700000002323b-276.dat nsis_installer_1 behavioral2/files/0x000700000002323b-276.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 CC0A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString CC0A.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3192 schtasks.exe 2164 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS explorer.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" explorer.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" explorer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main explorer.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-202 = "US Mountain Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" WerFault.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-622 = "Korea Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-461 = "Afghanistan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2142 = "Transbaikal Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3052 = "Qyzylorda Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-222 = "Alaskan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WerFault.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-592 = "Malay Peninsula Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-842 = "Argentina Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-31 = "Mid-Atlantic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WerFault.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WerFault.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-512 = "Central Asia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-731 = "Fiji Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-362 = "GTB Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-391 = "Arab Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-42 = "E. South America Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-332 = "E. Europe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" WerFault.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2002 = "Cabo Verde Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-351 = "FLE Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1412 = "Syria Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-602 = "Taipei Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2062 = "North Korea Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WerFault.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs Conhost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4436 toolspub2.exe 4436 toolspub2.exe 2128 powershell.exe 2128 powershell.exe 1880 e0cbefcb1af40c7d4aff4aca26621a98.exe 1880 e0cbefcb1af40c7d4aff4aca26621a98.exe 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4436 toolspub2.exe 3008 CC0A.exe 3008 CC0A.exe 3992 explorer.exe 3992 explorer.exe 3992 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2128 powershell.exe Token: SeDebugPrivilege 1880 e0cbefcb1af40c7d4aff4aca26621a98.exe Token: SeImpersonatePrivilege 1880 e0cbefcb1af40c7d4aff4aca26621a98.exe Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeDebugPrivilege 1356 WerFault.exe Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeDebugPrivilege 516 powershell.exe Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeDebugPrivilege 1804 Conhost.exe Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeDebugPrivilege 3008 CC0A.exe Token: SeRestorePrivilege 3008 CC0A.exe Token: SeBackupPrivilege 3008 CC0A.exe Token: SeLoadDriverPrivilege 3008 CC0A.exe Token: SeCreatePagefilePrivilege 3008 CC0A.exe Token: SeShutdownPrivilege 3008 CC0A.exe Token: SeTakeOwnershipPrivilege 3008 CC0A.exe Token: SeChangeNotifyPrivilege 3008 CC0A.exe Token: SeCreateTokenPrivilege 3008 CC0A.exe Token: SeMachineAccountPrivilege 3008 CC0A.exe Token: SeSecurityPrivilege 3008 CC0A.exe Token: SeAssignPrimaryTokenPrivilege 3008 CC0A.exe Token: SeCreateGlobalPrivilege 3008 CC0A.exe Token: 33 3008 CC0A.exe Token: SeDebugPrivilege 3992 explorer.exe Token: SeRestorePrivilege 3992 explorer.exe Token: SeBackupPrivilege 3992 explorer.exe Token: SeLoadDriverPrivilege 3992 explorer.exe Token: SeCreatePagefilePrivilege 3992 explorer.exe Token: SeShutdownPrivilege 3992 explorer.exe Token: SeTakeOwnershipPrivilege 3992 explorer.exe Token: SeChangeNotifyPrivilege 3992 explorer.exe Token: SeCreateTokenPrivilege 3992 explorer.exe Token: SeMachineAccountPrivilege 3992 explorer.exe Token: SeSecurityPrivilege 3992 explorer.exe Token: SeAssignPrimaryTokenPrivilege 3992 explorer.exe Token: SeCreateGlobalPrivilege 3992 explorer.exe Token: 33 3992 explorer.exe Token: SeDebugPrivilege 1036 powershell.exe Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeDebugPrivilege 2676 powershell.exe Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeDebugPrivilege 4092 powershell.exe Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeSystemEnvironmentPrivilege 4368 csrss.exe Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4980 BroomSetup.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3440 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2136 2100 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe 88 PID 2100 wrote to memory of 2136 2100 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe 88 PID 2100 wrote to memory of 2136 2100 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe 88 PID 2100 wrote to memory of 3976 2100 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe 92 PID 2100 wrote to memory of 3976 2100 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe 92 PID 2100 wrote to memory of 4436 2100 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe 89 PID 2100 wrote to memory of 4436 2100 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe 89 PID 2100 wrote to memory of 4436 2100 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe 89 PID 2100 wrote to memory of 1880 2100 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe 90 PID 2100 wrote to memory of 1880 2100 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe 90 PID 2100 wrote to memory of 1880 2100 6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe 90 PID 2136 wrote to memory of 4980 2136 InstallSetup8.exe 91 PID 2136 wrote to memory of 4980 2136 InstallSetup8.exe 91 PID 2136 wrote to memory of 4980 2136 InstallSetup8.exe 91 PID 1880 wrote to memory of 2128 1880 e0cbefcb1af40c7d4aff4aca26621a98.exe 94 PID 1880 wrote to memory of 2128 1880 e0cbefcb1af40c7d4aff4aca26621a98.exe 94 PID 1880 wrote to memory of 2128 1880 e0cbefcb1af40c7d4aff4aca26621a98.exe 94 PID 4004 wrote to memory of 1356 4004 e0cbefcb1af40c7d4aff4aca26621a98.exe 133 PID 4004 wrote to memory of 1356 4004 e0cbefcb1af40c7d4aff4aca26621a98.exe 133 PID 4004 wrote to memory of 1356 4004 e0cbefcb1af40c7d4aff4aca26621a98.exe 133 PID 4004 wrote to memory of 3128 4004 e0cbefcb1af40c7d4aff4aca26621a98.exe 120 PID 4004 wrote to memory of 3128 4004 e0cbefcb1af40c7d4aff4aca26621a98.exe 120 PID 3128 wrote to memory of 3544 3128 D226.exe 110 PID 3128 wrote to memory of 3544 3128 D226.exe 110 PID 4004 wrote to memory of 516 4004 e0cbefcb1af40c7d4aff4aca26621a98.exe 113 PID 4004 wrote to memory of 516 4004 e0cbefcb1af40c7d4aff4aca26621a98.exe 113 PID 4004 wrote to memory of 516 4004 e0cbefcb1af40c7d4aff4aca26621a98.exe 113 PID 4004 wrote to memory of 1804 4004 e0cbefcb1af40c7d4aff4aca26621a98.exe 128 PID 4004 wrote to memory of 1804 4004 e0cbefcb1af40c7d4aff4aca26621a98.exe 128 PID 4004 wrote to memory of 1804 4004 e0cbefcb1af40c7d4aff4aca26621a98.exe 128 PID 4004 wrote to memory of 4368 4004 e0cbefcb1af40c7d4aff4aca26621a98.exe 116 PID 4004 wrote to memory of 4368 4004 e0cbefcb1af40c7d4aff4aca26621a98.exe 116 PID 4004 wrote to memory of 4368 4004 e0cbefcb1af40c7d4aff4aca26621a98.exe 116 PID 3440 wrote to memory of 3008 3440 Process not Found 118 PID 3440 wrote to memory of 3008 3440 Process not Found 118 PID 3440 wrote to memory of 3008 3440 Process not Found 118 PID 3008 wrote to memory of 3992 3008 CC0A.exe 119 PID 3008 wrote to memory of 3992 3008 CC0A.exe 119 PID 3008 wrote to memory of 3992 3008 CC0A.exe 119 PID 3440 wrote to memory of 3128 3440 Process not Found 120 PID 3440 wrote to memory of 3128 3440 Process not Found 120 PID 3440 wrote to memory of 3128 3440 Process not Found 120 PID 3128 wrote to memory of 4440 3128 D226.exe 121 PID 3128 wrote to memory of 4440 3128 D226.exe 121 PID 3128 wrote to memory of 4440 3128 D226.exe 121 PID 4368 wrote to memory of 1036 4368 csrss.exe 122 PID 4368 wrote to memory of 1036 4368 csrss.exe 122 PID 4368 wrote to memory of 1036 4368 csrss.exe 122 PID 3992 wrote to memory of 2136 3992 explorer.exe 88 PID 3992 wrote to memory of 2136 3992 explorer.exe 88 PID 3992 wrote to memory of 1880 3992 explorer.exe 90 PID 3992 wrote to memory of 1880 3992 explorer.exe 90 PID 3992 wrote to memory of 4980 3992 explorer.exe 91 PID 3992 wrote to memory of 4980 3992 explorer.exe 91 PID 4368 wrote to memory of 2676 4368 csrss.exe 124 PID 4368 wrote to memory of 2676 4368 csrss.exe 124 PID 4368 wrote to memory of 2676 4368 csrss.exe 124 PID 4368 wrote to memory of 4092 4368 csrss.exe 131 PID 4368 wrote to memory of 4092 4368 csrss.exe 131 PID 4368 wrote to memory of 4092 4368 csrss.exe 131 PID 4368 wrote to memory of 3392 4368 csrss.exe 134 PID 4368 wrote to memory of 3392 4368 csrss.exe 134 PID 3196 wrote to memory of 1348 3196 windefender.exe 142 PID 3196 wrote to memory of 1348 3196 windefender.exe 142 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe"C:\Users\Admin\AppData\Local\Temp\6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
PID:4980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 9963⤵
- Program crash
PID:3012
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 3683⤵
- Program crash
PID:2516
-
-
-
C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1356
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:3128
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:516
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1804
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:2348
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:3192
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:3392
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:2164
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:1348
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
PID:3420
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\rty27.exe"C:\Users\Admin\AppData\Local\Temp\rty27.exe"2⤵
- Executes dropped EXE
PID:3976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4436 -ip 44361⤵PID:944
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
PID:3544
-
C:\Users\Admin\AppData\Local\Temp\CC0A.exeC:\Users\Admin\AppData\Local\Temp\CC0A.exe1⤵
- Sets file execution options in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
- Modifies firewall policy service
- Sets file execution options in registry
- Checks BIOS information in registry
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 11403⤵
- Drops file in System32 directory
- Program crash
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1356
-
-
-
C:\Users\Admin\AppData\Local\Temp\D226.exeC:\Users\Admin\AppData\Local\Temp\D226.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4440
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3992 -ip 39921⤵PID:4728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2136 -ip 21361⤵PID:2404
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:948
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD54853ce8fa77df18c3837d267c5837ad9
SHA14e3eb52fbec90b7cf8333b91d3eeb57f037976e6
SHA25610d5f9a5aa56a54fa3130e9b552f9a542b3b6ee0ea97b3a048586f0b49ce7f3d
SHA512a7713108691880c31a47069746fbf4b3dd2ec082ef0342c593cbcd6ab4f4a2d12511660b26f0dc600f2f7b6c592a6e526980eea5fe4a855ac81331f37e348d5b
-
Filesize
360KB
MD580c413180b6bd0dd664adc4e0665b494
SHA1e791e4a3391fc6b7bcb58399cd4fa3c52a06b940
SHA2566d99cec56614b6b8a23dfa84a50c6bbfde535411c6366ac2bcc20c9f5af62880
SHA512347f4ae6f308b37d055a6177478e45ab3838d7020abed70c7aa138d2c3771e709de204da8550aebdcaa6139d869dc7328cc7e645c4dd48d1066f9ad70225644a
-
Filesize
308KB
MD5932f4abc925c12b3bf7fa08b572843dd
SHA17c2d00e89400165cfacca49a97fbaea325fc7cf1
SHA2564f0d0ecf7453074ebbc28616b46d260d7d8e5289efd315c1e99c4dd8f78e812f
SHA512b05fa071890785c8bd8c0520d93f1e6898c43f411a7b640bdd45ecbde15fedb9146a92f1b0fd196a393332e444ef5a38a1d654db1a7132994702e3d051a8cc0b
-
Filesize
640KB
MD50194aee551eb7639e9ee6ecd65e636d2
SHA1aa37cee9d77bf5309d04fbda0222ca15e51cff9f
SHA25601e37dad98d63d1ec416e45073cca2c4aeb3708b30c9a01df7366b09c34cd96a
SHA512ad5b64923bb5d7bc9f349017659e1240d5d3d644d412784fd8e7c8ef8174d5e659fe22de58a01a7dc9e27957f941db6b5bc8d352e4d788f3cfabdd64ff36e0e9
-
Filesize
688KB
MD59684e84aa9f8eba529d21c0ac3433729
SHA1de1692b3c5948a80a6cf4b8e258b1b6db6093738
SHA2566c4a96b3d6dfc8ab4516735b613e0f8f7a74f1e79f35b5123d87c3be3cbe54be
SHA512832243ce8062b6e30a426978ade5262d499a458a890952a6f0375c9a37cba6be7fc6d1428b43864e9cf81f762d04481fe6199e685e327325f75375e797b697b5
-
Filesize
807KB
MD5b66d31ecb40036049a45a1c499b41ebc
SHA180394e860c3b1c13a5ea469f6d520d1df833132d
SHA25616d12170e84513b0a50aa400d9bed39181d414ce46d5b1dcb9a8910b55d9ed6c
SHA5122c514ed8888c2d1abc787ef38b7f6f62aa501c0953d88f442fcc508c53ff88fa73de3d01ac7456f6dca4f67c6d8a527ebae233dc0f6bcf40e2762b425e24f209
-
Filesize
625KB
MD5e836913e0d6c9ba06a8330e07500a8ed
SHA1cfc9da368739debcc9c8d6589d1e0311a0186d24
SHA256345ba36b3594151c953b98109af4d8b86e42bb6ce40a67e68e47ad5e244706b4
SHA512901b10b005ae121e1c056480df71ca9a782eb9f48f98ef76d89d5af6d218b9a263d807b103953e895212b7ca89cb25e313546a6eba39805ed444db1f8275dbb3
-
Filesize
2.4MB
MD51b7371528055d2f89c782f621c60d2e6
SHA196f7d347c4aadd5bbe131ab91ae4ae9c86dee8bc
SHA2560198998df660ee268a694a15874d5f4d19c3ed7d3446c482d8665657693bdc9d
SHA512a5105da332ad6be005f7a5fba829d18f05f1d0d6089ec49535212d0c00342b2129bd041c78a1f2155135856387f4d77e221d407268799d0a256bf945ce148869
-
Filesize
765KB
MD590927c43fcd0d1476522032741beccf2
SHA16f7e01393ce13b9b54aa27d3f21ba434039f3a26
SHA2568fa0589c022011714f9e652eccaf20b0cb0ff96e2f6af44cf02175a83445425b
SHA51245d1ce1c5858dbff6815781bb21d9bd6545a7ec7e611a10f38087c7c809f733635a79317689c7124f9fed8160fbb12eb0c0cbd29381e0983c38069225112dcfb
-
Filesize
795KB
MD5b304edce7dd10b9cd716d9f6e77e47f7
SHA1852d4a783302c63fed3262638265752ba0062609
SHA2567250f5fdc047ef82865a28c6c520ee5a69d7625d98557452d4f3cce7badf3acb
SHA512ffa126d02c9c577e9c79a7cf9db7fb6d19043a136a2760fa415ca1bc405f8bf4eee2b479f77bfd71b9ed17170497622a6842cbbcda34ff6d31c101a40b7cb770
-
Filesize
1022KB
MD5e7f839ad70c27f5073b7cd4f15f6ef7d
SHA1f3fc6d89d5bf617344c906da61927fed32582ca6
SHA2563513ac95e04ab70def7a97e8bee6c65614b7bc8d57eacb8c2c0e5b7c0cb0c18c
SHA5121008b40516a72ffe19854e4c913a4b285b60825fcb3c24752b024cc1ea57ddb492b1b350ea92072a7d92edebbc84e07ba2cd13e2de8c37d0a3641b07ad83ded7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
262KB
MD5cb9228d67f9b79f043b468b9ef64998a
SHA14cee4320b8600433701a69bef11bb9ed70ab2b62
SHA256cb44dfd47b05dc066676e9fa021e515d887714c608e518cbe01dd6a1e0f5238e
SHA512a0060c6e706d247d40949a84afcbf0740bddc36f70aa7f10e8dc2c55160b917af12553f6ee443aedfc0c4acd12fa48d87be43e290f0cc883f56c1668170c0202
-
Filesize
1.3MB
MD5c18dc246a84031d71d090520e88af5e5
SHA18fdb1c2d148462a07fe699d2bc0d12d145b52602
SHA2562bae59bd4f4c99114294acf5fafa03b9b4175e9df983b15b64852b5bf40a995d
SHA512f195312b75f2ab85b02b91224065cc8cee746889bc999500090fb6d67f87fd2057502cd5aebac28d70e83301fa8f433bd155530b315ef6b5190419483f9165f1
-
Filesize
2.4MB
MD531d6e063a59465bd757fe8f70236742d
SHA1fe4a796b244931bed1a54a9252eb8293dfe25e24
SHA2565c5c8e97c3bbdc84ed3877dc71b86c742e36c829be04e8df1568c34669de81ff
SHA5129a8779a56ffe95acc93bf9b01e5434189a071934794666e66a8bbd87f087f9ecca280d22b9e89d856bc4060affc76c623cb54029804b51aa417fb3bf79127828
-
Filesize
1.6MB
MD5c89d6cb36e6ee9959989199bbcb66409
SHA12a74c05d4ca810866fbccf8dc7e530f84978f9b7
SHA256344356e84c6436192450864c9264cd3d9d74e6c1aa191e1829ec2ca06e871494
SHA5121e11455803232bfe22d8c8c957b63a21f26e671fe8d32125806f92692b928339b6e50321baaf62ea8d0b901636b611d1e94b934f597440b4eff23073d75967fd
-
Filesize
1.1MB
MD58c59970692ed4f8f72093350b2eac7eb
SHA15b6285c9c76afd7945b9d1631c3f4c68291c3e6b
SHA256ea32cf3cc598380ec97e5d399b059459c8b048e7a63a02f3d89be4f4d6214393
SHA512a6e76ba5e0db261ef2a31838e4b6f67022f41ab8e56db860793a6af4e0632dc6c801b155bf1c1e6452a92dac4561e1b32598787f924c0978bf8a9828b814fc91
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
12KB
MD5dd87a973e01c5d9f8e0fcc81a0af7c7a
SHA1c9206ced48d1e5bc648b1d0f54cccc18bf643a14
SHA2567fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1
SHA5124910b39b1a99622ac8b3c42f173bbe7035ac2f8d40c946468e7db7e2868a2da81ea94da453857f06f39957dd690c7f1ba498936a7aaa0039975e472376f92e8f
-
Filesize
420KB
MD5afee6eeb6863a20a615d24406e563b6c
SHA18175c07e6c4154734e0512718dc6898437f4001c
SHA2560bcbd70a1b5dbec77ffbb14aaba62202b9736fb1f77c5e48a064afc5e2ffe01a
SHA512e1ec83688bbf4916bcd7a185a0a7e03278a426bce355c14ba886d2ac20322bc073c257ba599e01af0645d1a4535ec062021f58c44bd74593cee5cf8d937b47a4
-
Filesize
201KB
MD56aa6732f8a7ffe321b4e43d5702800e9
SHA11582c0f3d8c2f589d27d7f5c19f682bfd04e75d1
SHA2565e325be4bc51d83b75cb6e3182a8820a5f841a89b5d3e00969ce2a5f831ba5dc
SHA512456f31eac21a5435f9fbc35ddc88a8026094ad3b46a72e3f28835bf7004993b7625b56ef036456a2319cb83dfa190c087bec6dd5cb23512effe064104863c459
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ab8774c96e60709beced96238f2b7310
SHA19ac61185991124b6538f8c419675ea285b4afafd
SHA2560d7183c92e4b5a3abcd281d6b8b12d62a6e6d48ccab73e0d67074f0599adf09f
SHA5128069acc98089e6c660679ec4df2792d216a92ab01f49078ea4bf001e32ce7def957bbe5c85cec2c229090dbdbad3a477463b1ab04d97c9f26224c586fb4408fd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize16KB
MD5513f78c60eb1720dfc3e33dfcc672b96
SHA13c4db6827f808fb0e94c37cc25384012bf28fd04
SHA2564d36a148055e5c68a17a8e13075a6b1bc8af4ca494a55c960d90af5e0cbdd698
SHA5129ebeebc7817402c402df579632ff57859108521af483e5e46365897d142cfda799cd67b143fe71c265b2f5590940499fecc61fb9ae8d97be95115f6815728b8b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d7641d19688a1fe30482fb08827c76a7
SHA1f31392f56ea94ede123ca10963e7e54fe097e069
SHA2564dfb2affb40719f202f29e57f162e8b9af0947349540891115799473b78909d3
SHA512abd25fa77c6f588e0cf9e0d49aad3562a494294baecde9a3331bfe98e94cdc6781fb94e141d948b7620c4ac7f3ff16c480c57d1447bea20c7f61d1a23a91524c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58b3506557967f55beee338a491c516f3
SHA152fecea63340d3b3a93201844dfdc59a9374bbbd
SHA25656e03b52aef0f1b45f25acf91e69c4d1b603de7972d3ba8ea7a03a78de1ea062
SHA512a10af248a792265b7394e7f0e13245de315dbb2b5119bddaea99c4314783f0b9af23093945310eeaacc9f331b9f55c3f63c721d67717e6fb95c9b69c1b9d64f2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58d8ffefee3670988c80d96e751cef79f
SHA1c38647ac3277fd9704624b919f6a78d00bdbb565
SHA256f8f41b311c82a6cfef5a0796a86835ffad49bd0fd03e7431c88a6a8f9fc4ecc1
SHA512d10151bb01a4f71e507ec62fdd0f965e905753a639ad2f444d1b57af8c049f9196db9ef80a4272cccefd45a565223195ec7e3aca627711bb36a19293e39bd8dc
-
Filesize
457KB
MD5387744aa26642faa35b37fd117279d5e
SHA134d6909aabcf18cf93861b022b5e51b1df058cc7
SHA25613d774351a08b48ba3fe14ea6e6ee4a186c1734fcbd53084036f6435d4a452cd
SHA512e4787939f7b76a60134313877f3ef7497efa1b8a15130f54d28265a7371ba7f5effe157c8e40e31f00ffc797208882a2bdd63df532b8d7e494957bdc0e50928d
-
Filesize
610KB
MD5449af9a6a563dd1bdeded51f1934b7d7
SHA1a5be16120952e215d1966107e01da48bf152b8f7
SHA256e3c90a28d58f8528160bb3a071dcb328a08707c50025471e3f41907528ad1ba7
SHA512a386689094f31f965ed5745818a20e0a486401a437beb8d3c76cbc84f173968449ed69a3341f18f6b7a94bd2b3cabb86dec1b512226eb14efc9dc0f065eff804
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec