Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 12:57
Behavioral task
behavioral1
Sample
c36c3d5c2277002aeae8104b6551db81.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c36c3d5c2277002aeae8104b6551db81.exe
Resource
win10v2004-20240226-en
General
-
Target
c36c3d5c2277002aeae8104b6551db81.exe
-
Size
1022KB
-
MD5
c36c3d5c2277002aeae8104b6551db81
-
SHA1
3f459ce1405bbb974fa32433221605dae9010858
-
SHA256
479d48140e8de527abc4e9b0d6639e13f87a86b4589a1bbbfbc3972fc51d7956
-
SHA512
ae29608b39933f10acc77edfc529b819792f6c6260ffddc5fb793869f7c98d364de023a68f18e62758dcf65b0a319129efac9fb5b8ae26df917dc1766c7c2565
-
SSDEEP
24576:vK0qjIOA1K0OK0q2wPqK0AI2GjIp3INbP00tdRHGwPLwPBK0qXIG8mK0HK0/:i0qh0r0q2wf02GztvGwDws0q40q0/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" c36c3d5c2277002aeae8104b6551db81.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe," c36c3d5c2277002aeae8104b6551db81.exe -
Drops file in Drivers directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\spools.exe c36c3d5c2277002aeae8104b6551db81.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe c36c3d5c2277002aeae8104b6551db81.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe c36c3d5c2277002aeae8104b6551db81.exe File created C:\Windows\SysWOW64\drivers\spools.exe c36c3d5c2277002aeae8104b6551db81.exe -
Sets service image path in registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Schedule\ImagePath = "C:\\Windows\\system32\\drivers\\spools.exe" c36c3d5c2277002aeae8104b6551db81.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Schedule\ImagePath = "C:\\Windows\\system32\\drivers\\spools.exe" c36c3d5c2277002aeae8104b6551db81.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Schedule\ImagePath = "C:\\Windows\\system32\\drivers\\spools.exe" c36c3d5c2277002aeae8104b6551db81.exe -
ACProtect 1.3x - 1.4x DLL software 7 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x001000000002315d-10.dat acprotect behavioral2/memory/3736-13-0x0000000010000000-0x000000001010B000-memory.dmp acprotect behavioral2/memory/3736-14-0x0000000010000000-0x000000001010B000-memory.dmp acprotect behavioral2/memory/1908-24-0x0000000010000000-0x000000001010B000-memory.dmp acprotect behavioral2/memory/1908-25-0x0000000010000000-0x000000001010B000-memory.dmp acprotect behavioral2/memory/4260-38-0x0000000010000000-0x000000001010B000-memory.dmp acprotect behavioral2/memory/4260-40-0x0000000010000000-0x000000001010B000-memory.dmp acprotect -
Loads dropped DLL 3 IoCs
pid Process 3736 c36c3d5c2277002aeae8104b6551db81.exe 1908 c36c3d5c2277002aeae8104b6551db81.exe 4260 c36c3d5c2277002aeae8104b6551db81.exe -
resource yara_rule behavioral2/memory/3736-0-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/3136-1-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/files/0x000b000000023127-6.dat upx behavioral2/files/0x001000000002315d-10.dat upx behavioral2/memory/3736-13-0x0000000010000000-0x000000001010B000-memory.dmp upx behavioral2/memory/3736-14-0x0000000010000000-0x000000001010B000-memory.dmp upx behavioral2/memory/3736-15-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/files/0x000b000000023126-16.dat upx behavioral2/memory/1908-24-0x0000000010000000-0x000000001010B000-memory.dmp upx behavioral2/memory/1908-25-0x0000000010000000-0x000000001010B000-memory.dmp upx behavioral2/memory/1908-26-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/4260-27-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/3136-37-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/4260-38-0x0000000010000000-0x000000001010B000-memory.dmp upx behavioral2/memory/4764-39-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/4260-40-0x0000000010000000-0x000000001010B000-memory.dmp upx behavioral2/memory/4260-41-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/4712-43-0x0000000000400000-0x0000000000426000-memory.dmp upx -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" c36c3d5c2277002aeae8104b6551db81.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" c36c3d5c2277002aeae8104b6551db81.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" c36c3d5c2277002aeae8104b6551db81.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" c36c3d5c2277002aeae8104b6551db81.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" c36c3d5c2277002aeae8104b6551db81.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" c36c3d5c2277002aeae8104b6551db81.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" c36c3d5c2277002aeae8104b6551db81.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" c36c3d5c2277002aeae8104b6551db81.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" c36c3d5c2277002aeae8104b6551db81.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" c36c3d5c2277002aeae8104b6551db81.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" c36c3d5c2277002aeae8104b6551db81.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" c36c3d5c2277002aeae8104b6551db81.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\S: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\X: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\E: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\G: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\M: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\W: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\M: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\N: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\X: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\K: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\P: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\P: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\E: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\M: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\V: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\N: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\L: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\V: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\I: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\O: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\X: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\S: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\J: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\S: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\E: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\R: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\X: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\I: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\V: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\K: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\J: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\K: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\U: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\G: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\P: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\U: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\R: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\E: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\O: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\L: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\S: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\K: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\R: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\K: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\L: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\N: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\H: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\X: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\W: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\Q: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\R: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\U: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\E: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\W: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\M: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\N: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\W: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\N: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\S: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\Q: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\R: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\V: c36c3d5c2277002aeae8104b6551db81.exe File opened (read-only) \??\M: c36c3d5c2277002aeae8104b6551db81.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects reg.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UIHost = "logonui.exe" c36c3d5c2277002aeae8104b6551db81.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\ftpdll.dll c36c3d5c2277002aeae8104b6551db81.exe File opened for modification C:\Windows\SysWOW64\ftpdll.dll c36c3d5c2277002aeae8104b6551db81.exe File opened for modification C:\Windows\SysWOW64\ftpdll.dll c36c3d5c2277002aeae8104b6551db81.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3136 c36c3d5c2277002aeae8104b6551db81.exe 3136 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe 3736 c36c3d5c2277002aeae8104b6551db81.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3736 c36c3d5c2277002aeae8104b6551db81.exe 1908 c36c3d5c2277002aeae8104b6551db81.exe 4260 c36c3d5c2277002aeae8104b6551db81.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3736 wrote to memory of 3136 3736 c36c3d5c2277002aeae8104b6551db81.exe 94 PID 3736 wrote to memory of 3136 3736 c36c3d5c2277002aeae8104b6551db81.exe 94 PID 3736 wrote to memory of 3136 3736 c36c3d5c2277002aeae8104b6551db81.exe 94 PID 3736 wrote to memory of 3712 3736 c36c3d5c2277002aeae8104b6551db81.exe 96 PID 3736 wrote to memory of 3712 3736 c36c3d5c2277002aeae8104b6551db81.exe 96 PID 3736 wrote to memory of 3712 3736 c36c3d5c2277002aeae8104b6551db81.exe 96 PID 3736 wrote to memory of 4764 3736 c36c3d5c2277002aeae8104b6551db81.exe 97 PID 3736 wrote to memory of 4764 3736 c36c3d5c2277002aeae8104b6551db81.exe 97 PID 3736 wrote to memory of 4764 3736 c36c3d5c2277002aeae8104b6551db81.exe 97 PID 3136 wrote to memory of 1908 3136 c36c3d5c2277002aeae8104b6551db81.exe 101 PID 3136 wrote to memory of 1908 3136 c36c3d5c2277002aeae8104b6551db81.exe 101 PID 3136 wrote to memory of 1908 3136 c36c3d5c2277002aeae8104b6551db81.exe 101 PID 4764 wrote to memory of 4260 4764 c36c3d5c2277002aeae8104b6551db81.exe 106 PID 4764 wrote to memory of 4260 4764 c36c3d5c2277002aeae8104b6551db81.exe 106 PID 4764 wrote to memory of 4260 4764 c36c3d5c2277002aeae8104b6551db81.exe 106 PID 3136 wrote to memory of 4712 3136 c36c3d5c2277002aeae8104b6551db81.exe 108 PID 3136 wrote to memory of 4712 3136 c36c3d5c2277002aeae8104b6551db81.exe 108 PID 3136 wrote to memory of 4712 3136 c36c3d5c2277002aeae8104b6551db81.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\c36c3d5c2277002aeae8104b6551db81.exe"C:\Users\Admin\AppData\Local\Temp\c36c3d5c2277002aeae8104b6551db81.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Sets service image path in registry
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\c36c3d5c2277002aeae8104b6551db81.exeC:\Users\Admin\AppData\Local\Temp\c36c3d5c2277002aeae8104b6551db81.exe2⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\c36c3d5c2277002aeae8104b6551db81.exeC:\Users\Admin\AppData\Local\Temp\c36c3d5c2277002aeae8104b6551db81.exe3⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1908
-
-
C:\Users\Admin\AppData\Local\Temp\c36c3d5c2277002aeae8104b6551db81.exeC:\Users\Admin\AppData\Local\Temp\c36c3d5c2277002aeae8104b6551db81.exe3⤵
- Enumerates connected drives
PID:4712
-
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects" /f2⤵
- Installs/modifies Browser Helper Object
PID:3712
-
-
C:\Users\Admin\AppData\Local\Temp\c36c3d5c2277002aeae8104b6551db81.exeC:\Users\Admin\AppData\Local\Temp\c36c3d5c2277002aeae8104b6551db81.exe2⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\c36c3d5c2277002aeae8104b6551db81.exeC:\Users\Admin\AppData\Local\Temp\c36c3d5c2277002aeae8104b6551db81.exe3⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4260
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5ce4922128255feab36d9a7596ec733fb
SHA1c87b8f68fe2c9d289b433eaa3084cc03aceee4ab
SHA2567eb1543d887f181da20da852d005b29b14c8c8b593d0f7a660ceffe0d3d1aa08
SHA512717ace6d7bb5d09759a2e9017b7e39bdfda1d2ef5d5b965d6665585fc443927c28f9d13c2db912b85eae77831053c5324d1c1f6a828333432a2eee6e832bf366
-
Filesize
1.0MB
MD5d2c5063d50b810b00b035ab02888a2b6
SHA1222adf987b4b03e9dc13e3dde847c416c06f1f84
SHA256d6b013dd6ae264722e0a3f9e265713dc3a168fa5c4efd5de76a263884a898bd9
SHA51234199f3669ddd3a9ab6de995de54ce7523d0c4a70840c3238c1d04d291b7b0f10a3e37254b0bcd0f926f80abb16b93c5e6009ed4a3295f58f7fa449aff69b323
-
Filesize
5KB
MD5d807aa04480d1d149f7a4cac22984188
SHA1ffd5be65fd10017e34c11cecd105ebf4aa6c0cd9
SHA256eddf092d901afe128322910c3ff41a3f242d33d6b4cdf91ece327076b324ccbb
SHA512875543583c20ab164f37a4fb2587d234ce0a15d649d22b0d1dae5933f0a7683db170578746ea4458c51fec26e2243c6ec00dc10db8d4289789e50d5800cf863e