Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1799s -
max time network
1801s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/02/2024, 18:39
Static task
static1
Behavioral task
behavioral1
Sample
infectprint1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
infectprint1.exe
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
infectprint1.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral4
Sample
infectprint1.exe
Resource
win11-20240221-en
General
-
Target
infectprint1.exe
-
Size
79KB
-
MD5
0d4af64eb1995e67483f1ac5cde08aa3
-
SHA1
e12cb2931e67de580a8342bc478ef92e582b49ac
-
SHA256
580755838d3205f51c43877d96f43572dc53d6d8f94cf59ecdf5f5b3384f2b31
-
SHA512
7cd5124215968e3517c6c7cf1f62dcbc6c1295a1e8e200744e10375625e953eb5f376008abbe0e8524bd7a60193458123b372c342ab474a372b3f9cafe57e8fa
-
SSDEEP
1536:Oaci2JuhUKuTJk/K7t5bpQrnPheGIFZXDF5TBjg:6vnb+r2Ny
Malware Config
Signatures
-
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe pronto.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe pronto.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe attrib.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk Svhostr.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk pronto.exe -
Executes dropped EXE 2 IoCs
pid Process 3720 Svhostr.exe 3440 pronto.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" pronto.exe Set value (str) \REGISTRY\USER\S-1-5-21-4280069375-290121026-380765049-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pronto.exe" Svhostr.exe Set value (str) \REGISTRY\USER\S-1-5-21-4280069375-290121026-380765049-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" pronto.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" pronto.exe Set value (str) \REGISTRY\USER\S-1-5-21-4280069375-290121026-380765049-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" pronto.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 1 2.tcp.eu.ngrok.io 12 2.tcp.eu.ngrok.io 31 2.tcp.eu.ngrok.io -
Drops file in System32 directory 15 IoCs
description ioc Process File opened for modification C:\Windows\System32\ScriptRunner.exe infectprint1.exe File opened for modification C:\Windows\System32\UevTemplateBaselineGenerator.exe infectprint1.exe File opened for modification C:\Windows\SysWOW64\stordiag.exe infectprint1.exe File opened for modification C:\Windows\SysWOW64\TsWpfWrp.exe infectprint1.exe File opened for modification C:\Windows\System32\AppV\AppVStreamingUX.exe infectprint1.exe File opened for modification C:\Windows\System32\stordiag.exe infectprint1.exe File opened for modification C:\Windows\System32\tzsync.exe infectprint1.exe File opened for modification C:\Windows\System32\UevAppMonitor.exe infectprint1.exe File opened for modification C:\Windows\System32\UevTemplateConfigItemGenerator.exe infectprint1.exe File opened for modification C:\Windows\System32\FileHistory.exe infectprint1.exe File opened for modification C:\Windows\System32\Microsoft.Uev.SyncController.exe infectprint1.exe File opened for modification C:\Windows\System32\TsWpfWrp.exe infectprint1.exe File opened for modification C:\Windows\System32\UevAgentPolicyGenerator.exe infectprint1.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe infectprint1.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe infectprint1.exe -
Drops file in Program Files directory 11 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe infectprint1.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection64.exe infectprint1.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.PowerAutomateDesktop_1.0.65.0_x64__8wekyb3d8bbwe\PAD.Console.Host.exe infectprint1.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\DATABASECOMPARE.EXE infectprint1.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SPREADSHEETCOMPARE.EXE infectprint1.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.2104.12721.0_x64__8wekyb3d8bbwe\LocalBridge.exe infectprint1.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe infectprint1.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe infectprint1.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.exe infectprint1.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX45.exe infectprint1.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection.exe infectprint1.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_64\MSBuild\v4.0_4.0.0.0__b03f5f7f11d50a3a\MSBuild.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\amd64_wcf-servicemodelreg_b03f5f7f11d50a3a_10.0.22000.1_none_0969e5301d4a0c1b\ServiceModelReg.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-s..-diagnosticsmanaged_31bf3856ad364e35_10.0.22000.1_none_c52a6f9591cae974\stordiag.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\x86_msbuild_b03f5f7f11d50a3a_10.0.22000.1_none_1dfceb496fd6e2a0\MSBuild.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\x86_aspnet_regsql_b03f5f7f11d50a3a_10.0.22000.1_none_eca3e9e57ad31b94\aspnet_regsql.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-appmanagement-uevagent_31bf3856ad364e35_10.0.22000.469_none_f7ee9eea6a40784c\UevAppMonitor.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\amd64_netfx-ieexec_b03f5f7f11d50a3a_10.0.22000.1_none_463f193e37cf0011\IEExec.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\amd64_regsvcs_b03f5f7f11d50a3a_4.0.15806.0_none_4535bd2753202ac7\RegSvcs.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_32\MSBuild\v4.0_4.0.0.0__b03f5f7f11d50a3a\MSBuild.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\x86_aspnet_regbrowsers_b03f5f7f11d50a3a_10.0.22000.1_none_a631d85ed7b16283\aspnet_regbrowsers.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\x86_netfx4-ngentask_exe_b03f5f7f11d50a3a_4.0.15806.256_none_140bb56751c31463\ngentask.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\amd64_netfx-jsc_b03f5f7f11d50a3a_10.0.22000.1_none_dd296e21b988f15c\jsc.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\WsatConfig.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\EdmGen.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.5\EdmGen.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-timezone-sync_31bf3856ad364e35_10.0.22000.1_none_e5748d8a251de85f\tzsync.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\msil_addinprocess_b77a5c561934e089_10.0.22000.1_none_f1c351dedf09f213\AddInProcess.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\msil_datasvcutil_b77a5c561934e089_10.0.22000.1_none_c7f9dd62a8df7576\DataSvcUtil.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\wow64_msbuild_b03f5f7f11d50a3a_4.0.15806.0_none_0607cd955dab15ad\MSBuild.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v3.5\DataSvcUtil.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\amd64_dfsvc_b03f5f7f11d50a3a_4.0.15806.0_none_c0d3d16c74269fa6\dfsvc.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\dfsvc.exe infectprint1.exe File opened for modification C:\Windows\SystemApps\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\XBox.TCUI.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\aspnet_compiler.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\aspnet_regbrowsers.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\amd64_aspnet_regbrowsers_b03f5f7f11d50a3a_4.0.15806.0_none_646e7391043b0073\aspnet_regbrowsers.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\msil_ieexec_b03f5f7f11d50a3a_10.0.22000.1_none_1baa132fc64be8aa\IEExec.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.5\DataSvcUtil.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\amd64_wsatconfig_b03f5f7f11d50a3a_4.0.15806.0_none_63e43513a2a96ff5\WsatConfig.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-appmanagement-uevagent_31bf3856ad364e35_10.0.22000.100_none_f82676266a17f522\UevTemplateBaselineGenerator.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-m..nt-browser.appxmain_31bf3856ad364e35_10.0.22000.120_none_f759261c81fa2ed8\SecureAssessmentBrowser.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\wow64_aspnet_regbrowsers_b03f5f7f11d50a3a_4.0.15806.0_none_8e3cbaaac5859590\aspnet_regbrowsers.exe infectprint1.exe File opened for modification C:\Windows\assembly\GAC_MSIL\ComSvcConfig\3.0.0.0__b03f5f7f11d50a3a\ComSvcConfig.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMSvcHost.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\IEExec.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\amd64_addinutil_b77a5c561934e089_4.0.15806.0_none_fcd274061b4264d8\AddInUtil.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-filehistory-ui_31bf3856ad364e35_10.0.22000.1_none_a47620418fce3507\FileHistory.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-xbox-gamecallableui.appxmain_31bf3856ad364e35_10.0.22000.120_none_1e850fa96c804e78\XBox.TCUI.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\MSBuild.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\WsatConfig.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-appmanagement-uevagent_31bf3856ad364e35_10.0.22000.469_none_f7ee9eea6a40784c\UevTemplateBaselineGenerator.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.0\WPF\XamlViewer\XamlViewer_v0300.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.5\AddInProcess32.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\amd64_netfx4-ngentask_exe_b03f5f7f11d50a3a_4.0.15806.0_none_d4049e1f6926b032\ngentask.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\msil_presentationfontcache_31bf3856ad364e35_10.0.22000.1_none_07efd2effca007c3\PresentationFontCache.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\amd64_msbuild_b03f5f7f11d50a3a_3.5.22000.1_none_ac5cd13c097cdc14\MSBuild.exe infectprint1.exe File opened for modification C:\Windows\assembly\GAC_32\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-gpowershell-exe_31bf3856ad364e35_10.0.22000.1_none_9929679adadef360\powershell_ise.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\x86_regasm_b03f5f7f11d50a3a_10.0.22000.1_none_b3ddf74ed4239427\RegAsm.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\amd64_regasm_b03f5f7f11d50a3a_10.0.22000.1_none_6c30c077bfa76b21\RegAsm.exe infectprint1.exe File opened for modification C:\Windows\WinSxS\amd64_wcf-wsatconfig_b03f5f7f11d50a3a_10.0.22000.1_none_a03bdcb625ffa5d4\WsatConfig.exe infectprint1.exe File opened for modification C:\Windows\assembly\GAC_64\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\WsatConfig\v4.0_4.0.0.0__b03f5f7f11d50a3a\WsatConfig.exe infectprint1.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\SMSvcHost.exe infectprint1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3440 pronto.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe Token: SeIncBasePriorityPrivilege 3440 pronto.exe Token: 33 3440 pronto.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3516 wrote to memory of 3720 3516 infectprint1.exe 76 PID 3516 wrote to memory of 3720 3516 infectprint1.exe 76 PID 3516 wrote to memory of 3720 3516 infectprint1.exe 76 PID 3720 wrote to memory of 3440 3720 Svhostr.exe 77 PID 3720 wrote to memory of 3440 3720 Svhostr.exe 77 PID 3720 wrote to memory of 3440 3720 Svhostr.exe 77 PID 3720 wrote to memory of 4048 3720 Svhostr.exe 78 PID 3720 wrote to memory of 4048 3720 Svhostr.exe 78 PID 3720 wrote to memory of 4048 3720 Svhostr.exe 78 PID 3440 wrote to memory of 2696 3440 pronto.exe 80 PID 3440 wrote to memory of 2696 3440 pronto.exe 80 PID 3440 wrote to memory of 2696 3440 pronto.exe 80 PID 3440 wrote to memory of 2868 3440 pronto.exe 81 PID 3440 wrote to memory of 2868 3440 pronto.exe 81 PID 3440 wrote to memory of 2868 3440 pronto.exe 81 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 4048 attrib.exe 2696 attrib.exe 2868 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\infectprint1.exe"C:\Users\Admin\AppData\Local\Temp\infectprint1.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\Documents\Svhostr.exe"C:\Users\Admin\Documents\Svhostr.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\pronto.exe"C:\Users\Admin\AppData\Local\Temp\pronto.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe"4⤵
- Drops startup file
- Views/modifies file attributes
PID:2696
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.exe"4⤵
- Views/modifies file attributes
PID:2868
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Local\Temp\pronto.exe"3⤵
- Views/modifies file attributes
PID:4048
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection.exe
Filesize55KB
MD5d6e8f28c9e1e254b1cc4ccd375ca6668
SHA1efe5e84ada49e93aa991732290bb332d6ce13063
SHA256f0b662a907423aff1f91bdbe0a90d8f32f89dd160a2c0991aca1a069d0cd7b52
SHA51243b868d418269a83f99f60bcdd9c0ed7cc67e2863f23e57cbba4ee682dd7e046faa717b5e5cb12bdf76b8abbb3c5f71bf22f7a6e004ff8cbe54757ad8d38f833
-
Filesize
71KB
MD51afa948da741059408e0d33834c6117f
SHA1679e78f020eb9d8631f96e1b0f4038101a49631d
SHA256bb460fdaa71e28a02fc5a8b5a544acb94238a8d441460f4862e84493b02a26a1
SHA5128145b858e9b2a2d07e963bad0fca54b22bcaded0ce349f20cbf1674533f1b370b957505405a36e9d421b8d60157ad444930e9207de43fa7134849be899c0e466
-
Filesize
1KB
MD5db58d8b7098a03be933804caa947d083
SHA12a9a9e1ae15a565aee8b9bcb90b8a74910241a59
SHA2566b6ff1d2e9b59064d02685fcbd034c78d28558a8c69159f1675fc30389d86ee4
SHA5126c6f6c3f37d3818c9f46cb06242c59ffdac46b4cd563abc780ec293de15cc66a1db2ff9e50b976d50d7229903740269561a9abbdc9ae8af0e16cc4f6433b309f
-
Filesize
1KB
MD50f39233674686bbeda8e72b9ce03b47a
SHA16ead13ed34906743744f9b996b88fc74f920dffb
SHA256234e169afcd012775bac8fd3d7f4f5341fe9e560f9b6316ea91e773f11d1564c
SHA512a69ae76def8d1c6f7d511ddc5b421c886a97ce6f7707f18d4a8e95a5e8cb24349882698ee8f26dbc4f874f3cc02db4fc040b64bf53395b239505d50dded6a8b5
-
Filesize
27KB
MD5c596af6b612263a4f8522e8ff345fd77
SHA126bd8d1eacb0940afbb3fc56ca3900e20a573a06
SHA256ae46054bcc8861d767cf7c39d11e18aca0f9f393d6e26c779b95b12ddc725aa1
SHA512185ca33f9579270ceeb08cd1cdaa2d9c3157e677eebe0ab54956106866f3fabf83aaa60f5db3944b47090e8550ff3ade4caab538f383a8bca32dd3f1ae9e6a11