Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
112s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 16:47
Static task
static1
Behavioral task
behavioral1
Sample
o_0/cheeto.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
o_0/cheeto.exe
Resource
win10v2004-20240226-en
Errors
General
-
Target
o_0/cheeto.exe
-
Size
2.7MB
-
MD5
f6605997c91549e4186fb4d0034c66e4
-
SHA1
4d4fe16b3c8631031c705c80d533e7985746268e
-
SHA256
1f380cbfc19c54d243e0e970ddbbb0f448f26ac7c2eef81d1d3ede19cf41a9a6
-
SHA512
86aea69c8f65912922da5b9347d6031a666cb083bfc3935d92a16a007ba2598bd3516dd7658c73e230a1cf8ec2d995ba3cfdbbe1c4e25d62dd7a6cd83909663c
-
SSDEEP
49152:qjgoMlcWYfUFkMpWMONs8cWr2HQ/kLvPlbhVypjalf:kGlcNfekMpWM4c+2Hok7VypWlf
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2124 created 2436 2124 svchost.exe 428 -
Creates new service(s) 1 TTPs
-
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wmiprvse.exe -
Executes dropped EXE 1 IoCs
pid Process 4412 qcoffpfilryw.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4UserMode.evtx svchost.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe cheeto.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2472 set thread context of 5056 2472 cheeto.exe 119 -
Launches sc.exe 9 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1600 sc.exe 4056 sc.exe 2644 sc.exe 4380 sc.exe 3524 sc.exe 3728 sc.exe 1832 sc.exe 3016 sc.exe 4756 sc.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Process not Found -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe -
Modifies data under HKEY_USERS 58 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,17110992,7202269,41484365,17110988,7153487,39965824,17962391,508368333,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2472 cheeto.exe 3616 powershell.exe 3616 powershell.exe 3616 powershell.exe 2472 cheeto.exe 2472 cheeto.exe 2472 cheeto.exe 2472 cheeto.exe 2472 cheeto.exe 2472 cheeto.exe 2472 cheeto.exe 2472 cheeto.exe 5056 dialer.exe 5056 dialer.exe 2472 cheeto.exe 2472 cheeto.exe 2472 cheeto.exe 5056 dialer.exe 5056 dialer.exe 4412 qcoffpfilryw.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 5056 dialer.exe 5056 dialer.exe 5056 dialer.exe 5056 dialer.exe 2124 svchost.exe 2124 svchost.exe 5056 dialer.exe 5056 dialer.exe 1980 powershell.exe 2124 svchost.exe 2124 svchost.exe 5056 dialer.exe 5056 dialer.exe 5056 dialer.exe 5056 dialer.exe 5056 dialer.exe 5056 dialer.exe 5056 dialer.exe 5056 dialer.exe 1980 powershell.exe 5056 dialer.exe 5056 dialer.exe 5056 dialer.exe 5056 dialer.exe 5056 dialer.exe 5056 dialer.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 3384 Process not Found 4520 Process not Found 4132 Process not Found 364 Process not Found 688 Process not Found 4004 Process not Found 3616 Process not Found 3904 Process not Found 2652 Process not Found 4080 Process not Found 4996 Process not Found 1196 Process not Found 636 Process not Found 4880 Process not Found 4936 Process not Found 4512 Process not Found 780 Process not Found 4016 Process not Found 4044 Process not Found 396 Process not Found 3164 Process not Found 796 Process not Found 4960 Process not Found 2584 Process not Found 1776 Process not Found 1232 Process not Found 704 Process not Found 2932 Process not Found 3136 Process not Found 2384 Process not Found 4864 Process not Found 4788 Process not Found 4460 Process not Found 1936 Process not Found 3420 Process not Found 2592 Process not Found 2472 Process not Found 3720 Process not Found 2640 Process not Found 3744 Process not Found 1356 Process not Found 376 Process not Found 3736 Process not Found 3740 Process not Found 3844 Process not Found 2436 smss.exe 3716 smss.exe 4344 Process not Found 3524 Process not Found 4192 Process not Found 2380 Process not Found 2656 Process not Found 2492 Process not Found 1344 Process not Found 1392 Process not Found 3144 Process not Found 2396 Process not Found 3708 Process not Found 3432 Process not Found 3392 Process not Found 2588 Process not Found 820 Process not Found 2152 Process not Found 536 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3616 powershell.exe Token: SeDebugPrivilege 2472 cheeto.exe Token: SeDebugPrivilege 5056 dialer.exe Token: SeDebugPrivilege 1980 powershell.exe Token: SeAssignPrimaryTokenPrivilege 2852 svchost.exe Token: SeIncreaseQuotaPrivilege 2852 svchost.exe Token: SeSecurityPrivilege 2852 svchost.exe Token: SeTakeOwnershipPrivilege 2852 svchost.exe Token: SeLoadDriverPrivilege 2852 svchost.exe Token: SeSystemtimePrivilege 2852 svchost.exe Token: SeBackupPrivilege 2852 svchost.exe Token: SeRestorePrivilege 2852 svchost.exe Token: SeShutdownPrivilege 2852 svchost.exe Token: SeSystemEnvironmentPrivilege 2852 svchost.exe Token: SeUndockPrivilege 2852 svchost.exe Token: SeManageVolumePrivilege 2852 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2852 svchost.exe Token: SeIncreaseQuotaPrivilege 2852 svchost.exe Token: SeSecurityPrivilege 2852 svchost.exe Token: SeTakeOwnershipPrivilege 2852 svchost.exe Token: SeLoadDriverPrivilege 2852 svchost.exe Token: SeSystemtimePrivilege 2852 svchost.exe Token: SeBackupPrivilege 2852 svchost.exe Token: SeRestorePrivilege 2852 svchost.exe Token: SeShutdownPrivilege 2852 svchost.exe Token: SeSystemEnvironmentPrivilege 2852 svchost.exe Token: SeUndockPrivilege 2852 svchost.exe Token: SeManageVolumePrivilege 2852 svchost.exe Token: SeAuditPrivilege 2796 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2852 svchost.exe Token: SeIncreaseQuotaPrivilege 2852 svchost.exe Token: SeSecurityPrivilege 2852 svchost.exe Token: SeTakeOwnershipPrivilege 2852 svchost.exe Token: SeLoadDriverPrivilege 2852 svchost.exe Token: SeSystemtimePrivilege 2852 svchost.exe Token: SeBackupPrivilege 2852 svchost.exe Token: SeRestorePrivilege 2852 svchost.exe Token: SeShutdownPrivilege 2852 svchost.exe Token: SeSystemEnvironmentPrivilege 2852 svchost.exe Token: SeUndockPrivilege 2852 svchost.exe Token: SeManageVolumePrivilege 2852 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2852 svchost.exe Token: SeIncreaseQuotaPrivilege 2852 svchost.exe Token: SeSecurityPrivilege 2852 svchost.exe Token: SeTakeOwnershipPrivilege 2852 svchost.exe Token: SeLoadDriverPrivilege 2852 svchost.exe Token: SeSystemtimePrivilege 2852 svchost.exe Token: SeBackupPrivilege 2852 svchost.exe Token: SeRestorePrivilege 2852 svchost.exe Token: SeShutdownPrivilege 2852 svchost.exe Token: SeSystemEnvironmentPrivilege 2852 svchost.exe Token: SeUndockPrivilege 2852 svchost.exe Token: SeManageVolumePrivilege 2852 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2852 svchost.exe Token: SeIncreaseQuotaPrivilege 2852 svchost.exe Token: SeSecurityPrivilege 2852 svchost.exe Token: SeTakeOwnershipPrivilege 2852 svchost.exe Token: SeLoadDriverPrivilege 2852 svchost.exe Token: SeSystemtimePrivilege 2852 svchost.exe Token: SeBackupPrivilege 2852 svchost.exe Token: SeRestorePrivilege 2852 svchost.exe Token: SeShutdownPrivilege 2852 svchost.exe Token: SeSystemEnvironmentPrivilege 2852 svchost.exe Token: SeUndockPrivilege 2852 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4360 wrote to memory of 4904 4360 cmd.exe 112 PID 4360 wrote to memory of 4904 4360 cmd.exe 112 PID 2472 wrote to memory of 5056 2472 cheeto.exe 119 PID 2472 wrote to memory of 5056 2472 cheeto.exe 119 PID 2472 wrote to memory of 5056 2472 cheeto.exe 119 PID 2472 wrote to memory of 5056 2472 cheeto.exe 119 PID 2472 wrote to memory of 5056 2472 cheeto.exe 119 PID 2472 wrote to memory of 5056 2472 cheeto.exe 119 PID 2472 wrote to memory of 5056 2472 cheeto.exe 119 PID 5056 wrote to memory of 604 5056 dialer.exe 5 PID 5056 wrote to memory of 672 5056 dialer.exe 7 PID 5056 wrote to memory of 948 5056 dialer.exe 12 PID 5056 wrote to memory of 1012 5056 dialer.exe 13 PID 5056 wrote to memory of 528 5056 dialer.exe 14 PID 672 wrote to memory of 2808 672 lsass.exe 50 PID 672 wrote to memory of 2808 672 lsass.exe 50 PID 5056 wrote to memory of 408 5056 dialer.exe 15 PID 672 wrote to memory of 2808 672 lsass.exe 50 PID 672 wrote to memory of 2808 672 lsass.exe 50 PID 5056 wrote to memory of 848 5056 dialer.exe 16 PID 672 wrote to memory of 2808 672 lsass.exe 50 PID 672 wrote to memory of 2808 672 lsass.exe 50 PID 5056 wrote to memory of 1068 5056 dialer.exe 18 PID 5056 wrote to memory of 1088 5056 dialer.exe 19 PID 672 wrote to memory of 2808 672 lsass.exe 50 PID 5056 wrote to memory of 1184 5056 dialer.exe 20 PID 5056 wrote to memory of 1216 5056 dialer.exe 21 PID 672 wrote to memory of 2808 672 lsass.exe 50 PID 5056 wrote to memory of 1260 5056 dialer.exe 22 PID 5056 wrote to memory of 1276 5056 dialer.exe 23 PID 5056 wrote to memory of 1324 5056 dialer.exe 24 PID 5056 wrote to memory of 1420 5056 dialer.exe 25 PID 5056 wrote to memory of 1428 5056 dialer.exe 26 PID 5056 wrote to memory of 1532 5056 dialer.exe 27 PID 5056 wrote to memory of 1548 5056 dialer.exe 28 PID 5056 wrote to memory of 1636 5056 dialer.exe 29 PID 5056 wrote to memory of 1704 5056 dialer.exe 30 PID 5056 wrote to memory of 1752 5056 dialer.exe 31 PID 5056 wrote to memory of 1788 5056 dialer.exe 32 PID 5056 wrote to memory of 1892 5056 dialer.exe 33 PID 5056 wrote to memory of 1996 5056 dialer.exe 34 PID 5056 wrote to memory of 2004 5056 dialer.exe 35 PID 5056 wrote to memory of 1104 5056 dialer.exe 36 PID 5056 wrote to memory of 1696 5056 dialer.exe 37 PID 5056 wrote to memory of 2132 5056 dialer.exe 38 PID 5056 wrote to memory of 2144 5056 dialer.exe 39 PID 5056 wrote to memory of 2292 5056 dialer.exe 41 PID 672 wrote to memory of 2808 672 lsass.exe 50 PID 5056 wrote to memory of 2396 5056 dialer.exe 42 PID 5056 wrote to memory of 2416 5056 dialer.exe 43 PID 5056 wrote to memory of 2500 5056 dialer.exe 44 PID 5056 wrote to memory of 2508 5056 dialer.exe 45 PID 5056 wrote to memory of 2660 5056 dialer.exe 46 PID 1420 wrote to memory of 2848 1420 svchost.exe 137 PID 1420 wrote to memory of 2848 1420 svchost.exe 137 PID 672 wrote to memory of 2808 672 lsass.exe 50 PID 5056 wrote to memory of 2848 5056 dialer.exe 137 PID 5056 wrote to memory of 2668 5056 dialer.exe 47 PID 5056 wrote to memory of 2764 5056 dialer.exe 48 PID 5056 wrote to memory of 2796 5056 dialer.exe 49 PID 5056 wrote to memory of 2808 5056 dialer.exe 50 PID 5056 wrote to memory of 2828 5056 dialer.exe 51 PID 5056 wrote to memory of 2840 5056 dialer.exe 52 PID 5056 wrote to memory of 2852 5056 dialer.exe 53
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:604
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:1012
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:528
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc1⤵
- Modifies data under HKEY_USERS
PID:408
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:848
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1068
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1088
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Drops file in System32 directory
PID:1184
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1216
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2500
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1260
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1276
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2396
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2848
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:5040
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:4860
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:4176
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:3808
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2464
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1532
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1548
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1636
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1704
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1752
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1788
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1892
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1996
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2004
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1104
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1696
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2132
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2144
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2292
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2416
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2508
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
PID:2764
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2808
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:2828
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2840
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2868
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3120
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\o_0\cheeto.exe"C:\Users\Admin\AppData\Local\Temp\o_0\cheeto.exe"2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵PID:4904
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc3⤵
- Launches sc.exe
PID:3016
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:4056
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv3⤵
- Launches sc.exe
PID:2644
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits3⤵
- Launches sc.exe
PID:4756
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc3⤵
- Launches sc.exe
PID:4380
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5056
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "SGRRXHHC"3⤵
- Launches sc.exe
PID:3524
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "SGRRXHHC" binpath= "C:\ProgramData\yqrsoeqdzhrx\qcoffpfilryw.exe" start= "auto"3⤵
- Launches sc.exe
PID:3728
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:1832
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "SGRRXHHC"3⤵
- Launches sc.exe
PID:1600 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3132
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3364 -s 33442⤵PID:1516
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3888
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4640
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:1208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:2904
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Modifies data under HKEY_USERS
PID:2376
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:4060
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4272
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:2788
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵PID:4568
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=3316 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:32⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1424 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:82⤵PID:3896
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:724
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:1036
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3920
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3656
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:2124
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks BIOS information in registry
- Enumerates system info in registry
PID:1624
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:1048
-
C:\ProgramData\yqrsoeqdzhrx\qcoffpfilryw.exeC:\ProgramData\yqrsoeqdzhrx\qcoffpfilryw.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4412 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1980 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4440
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3716 -s 4481⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:2728
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000c0 000000841⤵
- Suspicious behavior: LoadsDriver
PID:2436
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000cc 000000841⤵
- Suspicious behavior: LoadsDriver
PID:3716
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000e4 000000841⤵PID:4848
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000e0 000000841⤵PID:4148
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000e8 000000841⤵PID:3496
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000f4 000000841⤵PID:4412
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000e4 000000841⤵PID:1600
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000c8 000000841⤵PID:704
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000dc 000000841⤵PID:2592
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000fc 000000841⤵PID:2436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5a117ccad8ce279a02a398d2b5e7d6b94
SHA17cfe974bac2ef256df84b30b1fe5797827612a82
SHA256e69ce8a39f9ac2b23d43d33476e4145468449490c30c7f02ee587bad84a37016
SHA51255684e057bccc88ba3ef821b95d51f6752a6f5d1ed9ab811a7c020e2c5d904f9e60f121ea95b0a3fff47850ae9badc1a284c27eaf0fe5a179f707b59fd9f2c47
-
Filesize
42KB
MD5a2b9e2d212f6d045265f954682b6d877
SHA1ad440c4ed880bbcd383c0f89cb7ceb4ae00d7a61
SHA25611c830ea0493f5ab637ff2d4023c556ad33b1761f584652a8c279108163ce3d4
SHA512035d1b10c0917b82373f5f5b708e9cbdedea966d393512beeb510679714fa748b587a4ce9059e88c68a1755e3a59089348f41662ad5b02f426dc3318e6a414b7
-
Filesize
13KB
MD584a9d20f2676675d2f979f0dcfc4dd4a
SHA11662ac8d9735e5b25fcd9dece04a253a3d106970
SHA2561f950e3bacdc344bc7b7072dd908ad77467d97a6380bffcab5cc2f92aa889470
SHA51245ca6c16c68d400b588973fee7e2d7612862c733b73f1429824301660d246c4d7dfb3ecd18b252d80d80f5cf37715059c2f0267af1836cb84fc9263f78db12a2
-
Filesize
13KB
MD587da5c2cc2c03e2d391fc955b4831ae2
SHA1325be3667bcc9c5b630d168f2c181e17cab6cbf6
SHA2561eaea410dbaf834b1c7affb38c10bfa1b9514cb1f69961f6f4af2331e9dfc0fa
SHA512046a86cda40cf921e1cc5e2cecda552f48d6d7153697bcab367569fef458772e3b5253f35ab86ae72cb9068e3fc43ade7af81eacaf38652ebb1fc0cc384fad65
-
Filesize
1.4MB
MD507c6ba5e891d9b7d287dde84498f1583
SHA1ddc58ed408765c762565c0d1f06a9ec355d48949
SHA256a17400610e8a3165fb8677e619b7af6b93ce6c0186a7da6c66184efc37913a5f
SHA51268ee47cd53db4bf22412227119e01bee86affda1231adac992fd4160f622c6962daaa7228d6254dcaaffb5d4f9420a13d82c4493262c84716ed7d9596cd4b67c
-
Filesize
1.4MB
MD5db9ab95a218f580e827770aa6a9d2555
SHA1f54ed7646aca8e91fa441778bb4ed4c5f6ddae83
SHA256e9447575be7242b0f10959d87a5bbb5a18b6e6e60cb6863c25e72481be34dc7e
SHA512d96bdfa4f63fe37d9c3a9d9380c8abd9a635630c255822d84a2835c5d26ad05affb62fd4cf3b43f1cd08a589b54a92c51e0469b4ee63657f6812bce545d267d4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
19KB
MD5650c0b7476a56bd456bd0de9f37c741a
SHA1155f7608564b2cff1f28e973c98e05d11cab1070
SHA2568670681c3ef63323dd3ba0ff1c8e73b7a07f1117315ed3449fe9b81d0e399fa9
SHA5121f206f5ef996213b712a000e6716d32587280d615f0e4d47e4d587b7e9292013efc9b2460e7cece1c5bcce601de406d709382d7d29efa7e0a188fd7928f77036