Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
b69bd2a127cc2c12ba4b628bb0e0d035.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b69bd2a127cc2c12ba4b628bb0e0d035.exe
Resource
win10v2004-20240226-en
General
-
Target
b69bd2a127cc2c12ba4b628bb0e0d035.exe
-
Size
2.4MB
-
MD5
b69bd2a127cc2c12ba4b628bb0e0d035
-
SHA1
70c85051e09cbc58ae2429368c019714729d5785
-
SHA256
0e8c9f17102cea76338850cc9d5069233adc41bc650f2a866b733d0d8647f6de
-
SHA512
88609002b4e787b0c5d768ac8ef5f4f457a9d742e8c5b1ac6c5cd92ba0a560fbeb8b80663eb6af6ec60135925c4666bc087e1ee23b081718409ae6d91c51ca0d
-
SSDEEP
49152:MdL41dExzKkljS0g7mM+M6RkMkIM7I067W:ZTHAM+M6RkMkIM7R
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" b69bd2a127cc2c12ba4b628bb0e0d035.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf b69bd2a127cc2c12ba4b628bb0e0d035.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\psr.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\raserver.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\RdpSaUacHelper.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\SndVol.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\svchost.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\SystemPropertiesDataExecutionPrevention.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\TokenBrokerCookies.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\DevicePairingWizard.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\WerFault.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\wbem\WmiPrvSE.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\winrshost.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\xwizard.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\Speech_OneCore\Common\SpeechModelDownload.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\comp.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\dxdiag.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\icacls.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\rasdial.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\runonce.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\tttracer.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\IME\IMETC\IMTCPROP.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\EhStorAuthn.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\makecab.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\NetCfgNotifyObjectHost.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\netsh.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\SyncHost.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\wiaacmgr.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\IME\SHARED\IMESEARCH.EXE b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\mfpmp.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\msfeedssync.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\net1.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\UserAccountControlSettings.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\userinit.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\grpconv.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\SystemPropertiesHardware.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\sdbinst.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\unlodctr.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\tasklist.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\convert.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\ddodiag.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\edpnotify.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\icsunattend.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\RMActivate_isv.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\RpcPing.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\sort.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\ComputerDefaults.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\WWAHost.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\TpmInit.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\GamePanel.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\printui.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\provlaunch.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\SystemPropertiesComputerName.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\TsWpfWrp.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\wermgr.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\WinRTNetMUAHostServer.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\finger.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\dvdplay.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\resmon.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\SearchFilterHost.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\SystemPropertiesProtection.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\Dism.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\dccw.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\find.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SysWOW64\NETSTAT.EXE b69bd2a127cc2c12ba4b628bb0e0d035.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\pwahelper.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File created C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Source Engine\OSE.EXE b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\AppSharingHookController.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File created C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File created C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File created C:\Program Files\VideoLAN\VLC\vlc.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{69188FC9-DE03-4F31-9660-69825F846706}\chrome_installer.exe$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File created C:\Program Files\Java\jre-1.8\bin\jabswitch.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File created C:\Program Files\Java\jre-1.8\bin\rmid.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\IntegratedOffice.exe$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Photos.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PDFREFLOW.EXE b69bd2a127cc2c12ba4b628bb0e0d035.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\ohub32.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\visicon.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\pwahelper.exe$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File created C:\Program Files\Java\jdk-1.8\bin\wsimport.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File created C:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PPTICO.EXE$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\1.3.185.17\MicrosoftEdgeUpdateSetup_X86_1.3.185.17.exe$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPPREARM.EXE$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedge_pwa_launcher.exe$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\ohub32.exe$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File created C:\Program Files\Microsoft Office\root\Office16\msoia.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\officeappguardwin32.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\AppSharingHookController.exe$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File created C:\Program Files\Java\jdk-1.8\bin\javaws.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\filecompare.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\xlicons.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File created C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\osmadminicon.exe$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\sscicons.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File created C:\Program Files\Microsoft Office\root\Office16\PerfBoost.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PerfBoost.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\aspnet_wp.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SystemApps\Microsoft.AsyncTextService_8wekyb3d8bbwe\Microsoft.AsyncTextService.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File created C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\WsatConfig.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SystemApps\microsoft.windows.narratorquickstart_8wekyb3d8bbwe\NarratorQuickStart.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SystemApps\Microsoft.AccountsControl_cw5n1h2txyewy\AccountsControlHost.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SystemApps\Windows.CBSPreview_cw5n1h2txyewy\CameraBarcodeScannerPreview.exe$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SystemApps\Microsoft.Win32WebViewHost_cw5n1h2txyewy\Win32WebViewHost.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\PinningConfirmationDialog.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SystemApps\ParentalControls_cw5n1h2txyewy\WpcUapApp.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\assembly\GAC_MSIL\WsatConfig\3.0.0.0__b03f5f7f11d50a3a\WsatConfig.exe$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework\NETFXSBS10.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File created C:\Windows\assembly\GAC_MSIL\SMSvcHost\3.0.0.0__b03f5f7f11d50a3a\SMSvcHost.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\acrotextextractor.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\UndockedDevKit.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\SecureAssessmentBrowser.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File created C:\Windows\SystemApps\Windows.CBSPreview_cw5n1h2txyewy\CameraBarcodeScannerPreview.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\assembly\GAC_MSIL\SMSvcHost\3.0.0.0__b03f5f7f11d50a3a\SMSvcHost.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMSvcHost\v4.0_4.0.0.0__b03f5f7f11d50a3a\SMSvcHost.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\CasPol.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\assembly\GAC_64\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\aspnet_state.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File created C:\Windows\assembly\GAC_64\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File created C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMSvcHost.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\assembly\GAC_MSIL\WsatConfig\3.0.0.0__b03f5f7f11d50a3a\WsatConfig.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\aspnet_regiis.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\WsatConfig\v4.0_4.0.0.0__b03f5f7f11d50a3a\WsatConfig.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\dfsvc.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_state.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v3.0\WPF\XamlViewer\XamlViewer_v0300.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.OOBENetworkCaptivePortal_cw5n1h2txyewy\OOBENetworkCaptivePortal.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v3.0\WPF\PresentationFontCache.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\acrobroker.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_regiis.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\aspnet_compiler.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\eula.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_regsql.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMConfigInstaller.exe$ b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMConfigInstaller.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\jsc.exe b69bd2a127cc2c12ba4b628bb0e0d035.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf b69bd2a127cc2c12ba4b628bb0e0d035.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3192 b69bd2a127cc2c12ba4b628bb0e0d035.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b69bd2a127cc2c12ba4b628bb0e0d035.exe"C:\Users\Admin\AppData\Local\Temp\b69bd2a127cc2c12ba4b628bb0e0d035.exe"1⤵
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:3192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5b69bd2a127cc2c12ba4b628bb0e0d035
SHA170c85051e09cbc58ae2429368c019714729d5785
SHA2560e8c9f17102cea76338850cc9d5069233adc41bc650f2a866b733d0d8647f6de
SHA51288609002b4e787b0c5d768ac8ef5f4f457a9d742e8c5b1ac6c5cd92ba0a560fbeb8b80663eb6af6ec60135925c4666bc087e1ee23b081718409ae6d91c51ca0d