Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 09:30
Behavioral task
behavioral1
Sample
a3709f87bff32b0d1b558857c475829d.exe
Resource
win7-20240221-en
General
-
Target
a3709f87bff32b0d1b558857c475829d.exe
-
Size
64KB
-
MD5
a3709f87bff32b0d1b558857c475829d
-
SHA1
562662f8a359f8cad3fc4df1654b5d1a0b2b9a6b
-
SHA256
06a803f1415da3e5d8dd3f04aaeb072bfc20daf4adeab07f28adc7696e3c3e75
-
SHA512
caffbc14937c5cc967794b607b1ca4e60406c0d7011b28d171dc9923c3b7d0880264128276955865b27703f08682e841cedcec0214ef867720382ca328230cd0
-
SSDEEP
1536:b7Qq/boy4uQxfMMw+GL2+Uxa+0w1I7m569+PMHaHx/X/:b7Qq/boy4J6+GL1j+IM69+PUM1
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" a3709f87bff32b0d1b558857c475829d.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a3709f87bff32b0d1b558857c475829d.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\spools.exe a3709f87bff32b0d1b558857c475829d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a3709f87bff32b0d1b558857c475829d.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Schedule\ImagePath = "C:\\Windows\\system32\\drivers\\spools.exe" a3709f87bff32b0d1b558857c475829d.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Users\\Admin\\cftmon.exe \"%1\" %*" a3709f87bff32b0d1b558857c475829d.exe -
resource yara_rule behavioral2/memory/4580-0-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4580-1-0x00000000009E0000-0x0000000001A05000-memory.dmp upx behavioral2/memory/4580-3-0x00000000009E0000-0x0000000001A05000-memory.dmp upx behavioral2/memory/4580-4-0x00000000009E0000-0x0000000001A05000-memory.dmp upx behavioral2/memory/4580-40-0x00000000009E0000-0x0000000001A05000-memory.dmp upx behavioral2/memory/4580-45-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-1790404759-2178872477-2616469472-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1790404759-2178872477-2616469472-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a3709f87bff32b0d1b558857c475829d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1790404759-2178872477-2616469472-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\cftmon.exe" a3709f87bff32b0d1b558857c475829d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a3709f87bff32b0d1b558857c475829d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\cftmon.exe" a3709f87bff32b0d1b558857c475829d.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a3709f87bff32b0d1b558857c475829d.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects reg.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UIHost = "logonui.exe" a3709f87bff32b0d1b558857c475829d.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\userinit.exe a3709f87bff32b0d1b558857c475829d.exe -
Drops file in Program Files directory 11 IoCs
description ioc Process File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\InspectorOfficeGadget.exe a3709f87bff32b0d1b558857c475829d.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\IntegratedOffice.exe a3709f87bff32b0d1b558857c475829d.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeClickToRun.exe a3709f87bff32b0d1b558857c475829d.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe a3709f87bff32b0d1b558857c475829d.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe a3709f87bff32b0d1b558857c475829d.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\AppVShNotify.exe a3709f87bff32b0d1b558857c475829d.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\MavInject32.exe a3709f87bff32b0d1b558857c475829d.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeC2RClient.exe a3709f87bff32b0d1b558857c475829d.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe a3709f87bff32b0d1b558857c475829d.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe a3709f87bff32b0d1b558857c475829d.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\appvcleaner.exe a3709f87bff32b0d1b558857c475829d.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI a3709f87bff32b0d1b558857c475829d.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Users\\Admin\\cftmon.exe \"%1\" %*" a3709f87bff32b0d1b558857c475829d.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe 4580 a3709f87bff32b0d1b558857c475829d.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe Token: SeDebugPrivilege 4580 a3709f87bff32b0d1b558857c475829d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4580 wrote to memory of 4904 4580 a3709f87bff32b0d1b558857c475829d.exe 91 PID 4580 wrote to memory of 4904 4580 a3709f87bff32b0d1b558857c475829d.exe 91 PID 4580 wrote to memory of 4904 4580 a3709f87bff32b0d1b558857c475829d.exe 91 PID 4580 wrote to memory of 4828 4580 a3709f87bff32b0d1b558857c475829d.exe 90 PID 4580 wrote to memory of 4828 4580 a3709f87bff32b0d1b558857c475829d.exe 90 PID 4580 wrote to memory of 4828 4580 a3709f87bff32b0d1b558857c475829d.exe 90 PID 4580 wrote to memory of 3776 4580 a3709f87bff32b0d1b558857c475829d.exe 89 PID 4580 wrote to memory of 3776 4580 a3709f87bff32b0d1b558857c475829d.exe 89 PID 4580 wrote to memory of 3776 4580 a3709f87bff32b0d1b558857c475829d.exe 89 PID 4580 wrote to memory of 3608 4580 a3709f87bff32b0d1b558857c475829d.exe 85 PID 4580 wrote to memory of 3608 4580 a3709f87bff32b0d1b558857c475829d.exe 85 PID 4580 wrote to memory of 3608 4580 a3709f87bff32b0d1b558857c475829d.exe 85 PID 4580 wrote to memory of 796 4580 a3709f87bff32b0d1b558857c475829d.exe 17 PID 4580 wrote to memory of 804 4580 a3709f87bff32b0d1b558857c475829d.exe 16 PID 4580 wrote to memory of 400 4580 a3709f87bff32b0d1b558857c475829d.exe 5 PID 4580 wrote to memory of 2504 4580 a3709f87bff32b0d1b558857c475829d.exe 65 PID 4580 wrote to memory of 2532 4580 a3709f87bff32b0d1b558857c475829d.exe 64 PID 4580 wrote to memory of 2648 4580 a3709f87bff32b0d1b558857c475829d.exe 61 PID 4580 wrote to memory of 3364 4580 a3709f87bff32b0d1b558857c475829d.exe 30 PID 4580 wrote to memory of 3512 4580 a3709f87bff32b0d1b558857c475829d.exe 29 PID 4580 wrote to memory of 3744 4580 a3709f87bff32b0d1b558857c475829d.exe 26 PID 4580 wrote to memory of 3848 4580 a3709f87bff32b0d1b558857c475829d.exe 28 PID 4580 wrote to memory of 3960 4580 a3709f87bff32b0d1b558857c475829d.exe 27 PID 4580 wrote to memory of 4064 4580 a3709f87bff32b0d1b558857c475829d.exe 57 PID 4580 wrote to memory of 3860 4580 a3709f87bff32b0d1b558857c475829d.exe 35 PID 4580 wrote to memory of 2180 4580 a3709f87bff32b0d1b558857c475829d.exe 55 PID 4580 wrote to memory of 4452 4580 a3709f87bff32b0d1b558857c475829d.exe 37 PID 4580 wrote to memory of 4236 4580 a3709f87bff32b0d1b558857c475829d.exe 41 PID 4580 wrote to memory of 3988 4580 a3709f87bff32b0d1b558857c475829d.exe 40 PID 4580 wrote to memory of 664 4580 a3709f87bff32b0d1b558857c475829d.exe 39 PID 4580 wrote to memory of 4904 4580 a3709f87bff32b0d1b558857c475829d.exe 91 PID 4580 wrote to memory of 4904 4580 a3709f87bff32b0d1b558857c475829d.exe 91 PID 4580 wrote to memory of 4828 4580 a3709f87bff32b0d1b558857c475829d.exe 90 PID 4580 wrote to memory of 4828 4580 a3709f87bff32b0d1b558857c475829d.exe 90 PID 4580 wrote to memory of 3776 4580 a3709f87bff32b0d1b558857c475829d.exe 89 PID 4580 wrote to memory of 3776 4580 a3709f87bff32b0d1b558857c475829d.exe 89 PID 4580 wrote to memory of 3608 4580 a3709f87bff32b0d1b558857c475829d.exe 85 PID 4580 wrote to memory of 3608 4580 a3709f87bff32b0d1b558857c475829d.exe 85 PID 4580 wrote to memory of 2328 4580 a3709f87bff32b0d1b558857c475829d.exe 88 PID 4580 wrote to memory of 1660 4580 a3709f87bff32b0d1b558857c475829d.exe 87 PID 4580 wrote to memory of 1828 4580 a3709f87bff32b0d1b558857c475829d.exe 86 PID 4580 wrote to memory of 4116 4580 a3709f87bff32b0d1b558857c475829d.exe 92 PID 4580 wrote to memory of 796 4580 a3709f87bff32b0d1b558857c475829d.exe 17 PID 4580 wrote to memory of 804 4580 a3709f87bff32b0d1b558857c475829d.exe 16 PID 4580 wrote to memory of 400 4580 a3709f87bff32b0d1b558857c475829d.exe 5 PID 4580 wrote to memory of 2504 4580 a3709f87bff32b0d1b558857c475829d.exe 65 PID 4580 wrote to memory of 2532 4580 a3709f87bff32b0d1b558857c475829d.exe 64 PID 4580 wrote to memory of 2648 4580 a3709f87bff32b0d1b558857c475829d.exe 61 PID 4580 wrote to memory of 3364 4580 a3709f87bff32b0d1b558857c475829d.exe 30 PID 4580 wrote to memory of 3512 4580 a3709f87bff32b0d1b558857c475829d.exe 29 PID 4580 wrote to memory of 3744 4580 a3709f87bff32b0d1b558857c475829d.exe 26 PID 4580 wrote to memory of 3848 4580 a3709f87bff32b0d1b558857c475829d.exe 28 PID 4580 wrote to memory of 3960 4580 a3709f87bff32b0d1b558857c475829d.exe 27 PID 4580 wrote to memory of 4064 4580 a3709f87bff32b0d1b558857c475829d.exe 57 PID 4580 wrote to memory of 3860 4580 a3709f87bff32b0d1b558857c475829d.exe 35 PID 4580 wrote to memory of 2180 4580 a3709f87bff32b0d1b558857c475829d.exe 55 PID 4580 wrote to memory of 4452 4580 a3709f87bff32b0d1b558857c475829d.exe 37 PID 4580 wrote to memory of 4236 4580 a3709f87bff32b0d1b558857c475829d.exe 41 PID 4580 wrote to memory of 3988 4580 a3709f87bff32b0d1b558857c475829d.exe 40 PID 4580 wrote to memory of 2736 4580 a3709f87bff32b0d1b558857c475829d.exe 94 PID 4580 wrote to memory of 5052 4580 a3709f87bff32b0d1b558857c475829d.exe 95 PID 4580 wrote to memory of 796 4580 a3709f87bff32b0d1b558857c475829d.exe 17 PID 4580 wrote to memory of 804 4580 a3709f87bff32b0d1b558857c475829d.exe 16 PID 4580 wrote to memory of 400 4580 a3709f87bff32b0d1b558857c475829d.exe 5 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a3709f87bff32b0d1b558857c475829d.exe
Processes
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:400
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:804
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:796
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3744
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3960
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3848
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3512
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\a3709f87bff32b0d1b558857c475829d.exe"C:\Users\Admin\AppData\Local\Temp\a3709f87bff32b0d1b558857c475829d.exe"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Drops file in Drivers directory
- Sets service image path in registry
- Modifies system executable filetype association
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4580 -
C:\Windows\SysWOW64\reg.exereg copy "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Terminal" /s /f3⤵PID:3608
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4116
-
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /f3⤵
- Adds Run key to start application
PID:3776
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /f3⤵
- Adds Run key to start application
PID:4828
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects" /f3⤵
- Installs/modifies Browser Helper Object
PID:4904
-
-
C:\Windows\SysWOW64\REGEDT32.EXE"C:\Windows\system32\REGEDT32.EXE"3⤵PID:820
-
-
C:\Windows\SysWOW64\CMD.EXE"C:\Windows\system32\CMD.EXE"3⤵PID:1084
-
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3860
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:4452
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:664
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:3988
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca1⤵PID:4236
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2180
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4064
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2648
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2532
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2504
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1828
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1660
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2328
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2736
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:5052
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Browser Extensions
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1