Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/02/2024, 20:49
Static task
static1
Behavioral task
behavioral1
Sample
aa1fa7d9fa95da23c811628a0b5990df.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
aa1fa7d9fa95da23c811628a0b5990df.exe
Resource
win10v2004-20240226-en
General
-
Target
aa1fa7d9fa95da23c811628a0b5990df.exe
-
Size
460KB
-
MD5
aa1fa7d9fa95da23c811628a0b5990df
-
SHA1
dd5fe9f7819d312fcc2fdf1ad70a4214963d3461
-
SHA256
6af860a416d9d5c82997df0f270043c23e7e09d5f4f2711f821acf9772b8ca54
-
SHA512
15f5b567673ce70a20ea8ced9348896e977e1ffc6b18fd72d8f2a866d8589f62338d3ac56f06786548ee5244547dee50d6e031008f85b7f303b9241b32521acb
-
SSDEEP
12288:6lSt6oIHNOhU5O5TYo4XqTig5GSR9CClDDL:6lSt69HNx6T/5xT
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wjtoc.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" iBdqphzke5.exe -
Deletes itself 1 IoCs
pid Process 2384 cmd.exe -
Executes dropped EXE 7 IoCs
pid Process 2836 iBdqphzke5.exe 2580 wjtoc.exe 2444 astat.exe 2624 astat.exe 2856 dstat.exe 816 fstat.exe 340 csrss.exe -
Loads dropped DLL 10 IoCs
pid Process 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 2836 iBdqphzke5.exe 2836 iBdqphzke5.exe 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 2820 aa1fa7d9fa95da23c811628a0b5990df.exe -
resource yara_rule behavioral1/memory/2624-41-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2624-43-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2624-47-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /C" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /r" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /A" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /s" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /y" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /B" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /j" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /z" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /t" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /M" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /w" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /h" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /n" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /o" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /p" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /a" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /G" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /W" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /Z" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /H" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /b" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /v" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /r" iBdqphzke5.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /L" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /N" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /T" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /I" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /m" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /Q" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /E" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /q" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /V" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /X" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /R" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /U" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /O" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /S" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /c" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /i" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /P" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /D" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /d" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /l" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /F" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /u" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /Y" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /J" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /g" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /f" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /x" wjtoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjtoc = "C:\\Users\\Admin\\wjtoc.exe /K" wjtoc.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created \systemroot\assembly\GAC_32\Desktop.ini csrss.exe File created \systemroot\assembly\GAC_64\Desktop.ini csrss.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2444 set thread context of 2624 2444 astat.exe 34 PID 816 set thread context of 1000 816 fstat.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2568 tasklist.exe 2388 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2836 iBdqphzke5.exe 2836 iBdqphzke5.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 816 fstat.exe 816 fstat.exe 816 fstat.exe 2580 wjtoc.exe 2580 wjtoc.exe 816 fstat.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe 2580 wjtoc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2568 tasklist.exe Token: SeDebugPrivilege 816 fstat.exe Token: SeDebugPrivilege 816 fstat.exe Token: SeDebugPrivilege 2388 tasklist.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 2836 iBdqphzke5.exe 2580 wjtoc.exe 2444 astat.exe 2856 dstat.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 340 csrss.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2836 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 28 PID 2820 wrote to memory of 2836 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 28 PID 2820 wrote to memory of 2836 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 28 PID 2820 wrote to memory of 2836 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 28 PID 2836 wrote to memory of 2580 2836 iBdqphzke5.exe 29 PID 2836 wrote to memory of 2580 2836 iBdqphzke5.exe 29 PID 2836 wrote to memory of 2580 2836 iBdqphzke5.exe 29 PID 2836 wrote to memory of 2580 2836 iBdqphzke5.exe 29 PID 2836 wrote to memory of 2592 2836 iBdqphzke5.exe 30 PID 2836 wrote to memory of 2592 2836 iBdqphzke5.exe 30 PID 2836 wrote to memory of 2592 2836 iBdqphzke5.exe 30 PID 2836 wrote to memory of 2592 2836 iBdqphzke5.exe 30 PID 2592 wrote to memory of 2568 2592 cmd.exe 32 PID 2592 wrote to memory of 2568 2592 cmd.exe 32 PID 2592 wrote to memory of 2568 2592 cmd.exe 32 PID 2592 wrote to memory of 2568 2592 cmd.exe 32 PID 2820 wrote to memory of 2444 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 33 PID 2820 wrote to memory of 2444 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 33 PID 2820 wrote to memory of 2444 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 33 PID 2820 wrote to memory of 2444 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 33 PID 2444 wrote to memory of 2624 2444 astat.exe 34 PID 2444 wrote to memory of 2624 2444 astat.exe 34 PID 2444 wrote to memory of 2624 2444 astat.exe 34 PID 2444 wrote to memory of 2624 2444 astat.exe 34 PID 2444 wrote to memory of 2624 2444 astat.exe 34 PID 2444 wrote to memory of 2624 2444 astat.exe 34 PID 2444 wrote to memory of 2624 2444 astat.exe 34 PID 2444 wrote to memory of 2624 2444 astat.exe 34 PID 2820 wrote to memory of 2856 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 36 PID 2820 wrote to memory of 2856 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 36 PID 2820 wrote to memory of 2856 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 36 PID 2820 wrote to memory of 2856 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 36 PID 2820 wrote to memory of 816 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 37 PID 2820 wrote to memory of 816 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 37 PID 2820 wrote to memory of 816 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 37 PID 2820 wrote to memory of 816 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 37 PID 816 wrote to memory of 1224 816 fstat.exe 11 PID 816 wrote to memory of 340 816 fstat.exe 26 PID 816 wrote to memory of 1000 816 fstat.exe 38 PID 816 wrote to memory of 1000 816 fstat.exe 38 PID 816 wrote to memory of 1000 816 fstat.exe 38 PID 816 wrote to memory of 1000 816 fstat.exe 38 PID 816 wrote to memory of 1000 816 fstat.exe 38 PID 340 wrote to memory of 556 340 csrss.exe 40 PID 340 wrote to memory of 556 340 csrss.exe 40 PID 340 wrote to memory of 2476 340 csrss.exe 41 PID 340 wrote to memory of 2476 340 csrss.exe 41 PID 2820 wrote to memory of 2384 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 42 PID 2820 wrote to memory of 2384 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 42 PID 2820 wrote to memory of 2384 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 42 PID 2820 wrote to memory of 2384 2820 aa1fa7d9fa95da23c811628a0b5990df.exe 42 PID 2384 wrote to memory of 2388 2384 cmd.exe 44 PID 2384 wrote to memory of 2388 2384 cmd.exe 44 PID 2384 wrote to memory of 2388 2384 cmd.exe 44 PID 2384 wrote to memory of 2388 2384 cmd.exe 44 PID 340 wrote to memory of 864 340 csrss.exe 19
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\aa1fa7d9fa95da23c811628a0b5990df.exe"C:\Users\Admin\AppData\Local\Temp\aa1fa7d9fa95da23c811628a0b5990df.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\iBdqphzke5.exeC:\Users\Admin\iBdqphzke5.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\wjtoc.exe"C:\Users\Admin\wjtoc.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2580
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del iBdqphzke5.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
-
-
C:\Users\Admin\astat.exeC:\Users\Admin\astat.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\astat.exe"C:\Users\Admin\astat.exe"4⤵
- Executes dropped EXE
PID:2624
-
-
-
C:\Users\Admin\dstat.exeC:\Users\Admin\dstat.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2856
-
-
C:\Users\Admin\fstat.exeC:\Users\Admin\fstat.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:1000
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del aa1fa7d9fa95da23c811628a0b5990df.exe3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵PID:864
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R2⤵PID:556
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:340
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding1⤵PID:2476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b6da847084e39e0cecf175c32c91b4bb
SHA1fbfd9494fabed5220cdf01866ff088fe7adc535b
SHA256065781e8a55cf59cb926d5950e0039e19b50b1e081023404fbff4d7a32fc9cbe
SHA51259d372ea36904cd48c99f2f34740c22004b35c5e5dada2417813b0463292af19e4aa5ba4552cc443da373e40ba03a1f7906019a567806806f5972c202a31d9d2
-
Filesize
271KB
MD534353cf7e1d1b10bcbbcae0745110535
SHA12fb471681daac6f6d66477b7772025da4f58c508
SHA256b2d7a66e2d10d8943e48d6f3ad75237ff379e82ab0101a620406c4569be1d959
SHA5127404f82abfabd21d6f2a88b55f6f0ff886bb0a1f16a9d45c6883d74daa26451f862a10a78646c549c3a3264ba4bd9fb44949d470493af895973dd05a0ec311e6
-
Filesize
53KB
MD54d7cde615a0f534bd5e359951829554b
SHA1c885d00d9000f2a5dbc78f6193a052b36f4fe968
SHA256414fdf9bdcae5136c1295d6d24740c50a484acd81f1f7d0fb5d5c138607cb80a
SHA51233d632f9fbb694440a1ca568c90518784278efd1dc9ee2b57028149d56ebe1f7346d5b59dcfafee2eeaa10091dda05f48958e909d6bfc891e037ae1cfbd048d4
-
Filesize
2KB
MD5a57edf8918aaf458c807116187ca68b3
SHA106f0b40b4fb6042f9d2eaf67fc938e326187950e
SHA256c1f2970a73a8bb2261f546c871e81f5c72473a50e6a257f4a29b5ddb341c501d
SHA5120ceb4d43f996bf0adbbcb29638fec507ab45545dccb820f5b81bc6ffd001b36723441aff1177c08729700069c5748253f3691e32a0c450411878ad68b87e6ef0
-
Filesize
60KB
MD587c6498966e3f85fac743c89050aa312
SHA105c165c34cbfa14e4925c33ace81992b0f50a2b5
SHA25630c8328585e41968aff773da16cedbe590dcefd293c7fa74a69c557ecbf2c3c5
SHA512740f7159ee78f73e57c92e583b8c4f97c5dd49b68b9c321da976d7e318819daa28e8dfc76e95e1e3ccee643dc464324c40b481d1849863e287d826adb577b420
-
Filesize
244KB
MD5a4cdb62cf4866a17e742e7e9cc73d237
SHA130d94f8e872455ac569949ac4c768d0a0cdfbba7
SHA256c741d649bf5b72fbe97470820ce994ce29b153baae14af10c3a2a9adc3098b32
SHA512c4447f95565d3e5dc0ef7712382325280bedf127ac682f85f4043b586afb4188633f2c73277595eb31fe45d992107492f42c82a71f448286a9cb8fac4bfb3671
-
Filesize
244KB
MD58f8ee2009a4629377e2ea9aebb1ad79b
SHA1d0e281545949c6b3e11569985ee94d3cbb1f04ae
SHA2562b44c76bb7511f2baaddd1704309c44db28a0e97c77125e8841b114b9be6cc32
SHA5121f7e1af7549313cf9913cc149bd9d153449ac0a46bdc048715cffb9bdf50dda2637ca31a7034c4425d0ea9c15fc001bcb46830070e48959cd3f5654247ae4fa0