Overview
overview
10Static
static
3New Text D...od.exe
windows7-x64
10New Text D...od.exe
windows10-1703-x64
10New Text D...od.exe
windows10-2004-x64
10New Text D...od.exe
windows11-21h2-x64
10New Text D...od.exe
windows7-x64
10New Text D...od.exe
windows10-1703-x64
10New Text D...od.exe
windows10-2004-x64
10New Text D...od.exe
windows11-21h2-x64
10Resubmissions
09-04-2024 07:01
240409-htps3scd2w 1009-04-2024 07:01
240409-htf6yacc9x 1009-04-2024 07:00
240409-hs6p7scc81 1009-04-2024 07:00
240409-hss44scc7z 1007-03-2024 22:29
240307-2eh7jagg41 10Analysis
-
max time kernel
284s -
max time network
297s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-04-2024 07:00
Static task
static1
Behavioral task
behavioral1
Sample
New Text Document mod.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
New Text Document mod.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
New Text Document mod.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
New Text Document mod.exe
Resource
win11-20240221-en
Behavioral task
behavioral5
Sample
New Text Document mod.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
New Text Document mod.exe
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
New Text Document mod.exe
Resource
win10v2004-20240319-en
Behavioral task
behavioral8
Sample
New Text Document mod.exe
Resource
win11-20240221-en
General
-
Target
New Text Document mod.exe
-
Size
8KB
-
MD5
69994ff2f00eeca9335ccd502198e05b
-
SHA1
b13a15a5bea65b711b835ce8eccd2a699a99cead
-
SHA256
2e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2
-
SHA512
ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3
-
SSDEEP
96:y7ov9wc1dN1Unh3EHJ40CUJCrQt0LpCBIW12nEtgpH9GIkQYQoBNw9fnmK5iLjTv:yZyTFJfCB20LsBIW12n/eIkQ2BNg5S1
Malware Config
Extracted
redline
6077866846
https://pastebin.com/raw/KE5Mft0T
Extracted
metasploit
metasploit_stager
91.92.247.21:8405
Extracted
xworm
94.156.8.213:58002
-
Install_directory
%Public%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 2 IoCs
Processes:
resource yara_rule behavioral5/memory/1816-1218-0x0000000000100000-0x0000000000116000-memory.dmp family_xworm C:\Users\Admin\AppData\Local\Temp\a\svchost.exe family_xworm -
Detect ZGRat V1 34 IoCs
Processes:
resource yara_rule behavioral5/memory/600-368-0x000000001C1D0000-0x000000001C446000-memory.dmp family_zgrat_v1 behavioral5/memory/600-403-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-404-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-408-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-410-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-413-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-415-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-417-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-422-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-426-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-428-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-431-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-445-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-455-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-457-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-459-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-462-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-464-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-471-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-475-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-477-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-494-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-496-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-506-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-509-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-512-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-514-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-517-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-519-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-521-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/600-523-0x000000001C1D0000-0x000000001C441000-memory.dmp family_zgrat_v1 behavioral5/memory/2568-1290-0x0000000001230000-0x0000000004B28000-memory.dmp family_zgrat_v1 behavioral5/memory/2568-1299-0x000000001ECE0000-0x000000001EDF0000-memory.dmp family_zgrat_v1 behavioral5/memory/2568-1303-0x0000000000BF0000-0x0000000000C14000-memory.dmp family_zgrat_v1 -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral5/memory/364-178-0x0000000000140000-0x0000000000162000-memory.dmp family_redline -
Downloads MZ/PE file
-
Drops startup file 1 IoCs
Processes:
word.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\word.vbs word.exe -
Executes dropped EXE 22 IoCs
Processes:
crypted6077866846MVYQY.exei1gcbW1E.exedisable-defender.exepclient.exeresponsibilitylead.exeMStore.exeProps.exewininit.exe1234.exeISetup8.exetest2.exeword.exeu2b0.0.exeu2b0.1.exeMService.exe1111.exeISetup2.exeTester.exesvchost.exe555.exeu1j4.0.exesvchost.exepid process 364 crypted6077866846MVYQY.exe 1512 i1gcbW1E.exe 960 disable-defender.exe 1636 pclient.exe 600 responsibilitylead.exe 1488 MStore.exe 1732 Props.exe 2476 wininit.exe 2764 1234.exe 2988 ISetup8.exe 1916 test2.exe 2936 word.exe 2644 u2b0.0.exe 1956 u2b0.1.exe 2516 MService.exe 1152 1111.exe 1984 ISetup2.exe 2108 Tester.exe 1816 svchost.exe 1756 555.exe 1080 u1j4.0.exe 768 svchost.exe -
Loads dropped DLL 35 IoCs
Processes:
New Text Document mod.exepclient.exewininit.exeISetup8.exeMStore.exeu2b0.0.exeISetup2.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exepid process 2968 New Text Document mod.exe 2968 New Text Document mod.exe 2968 New Text Document mod.exe 1828 2968 New Text Document mod.exe 1636 pclient.exe 2968 New Text Document mod.exe 1892 2968 New Text Document mod.exe 2968 New Text Document mod.exe 2968 New Text Document mod.exe 2968 New Text Document mod.exe 2476 wininit.exe 2988 ISetup8.exe 2988 ISetup8.exe 2988 ISetup8.exe 2988 ISetup8.exe 2988 ISetup8.exe 2988 ISetup8.exe 2988 ISetup8.exe 2988 ISetup8.exe 1488 MStore.exe 1488 MStore.exe 2968 New Text Document mod.exe 2968 New Text Document mod.exe 2644 u2b0.0.exe 2644 u2b0.0.exe 2968 New Text Document mod.exe 2968 New Text Document mod.exe 1984 ISetup2.exe 1984 ISetup2.exe 1984 ISetup2.exe 1984 ISetup2.exe 2568 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2568 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
pclient.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" pclient.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
Processes:
flow ioc 12 raw.githubusercontent.com 13 raw.githubusercontent.com 25 pastebin.com 26 pastebin.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\a\wininit.exe autoit_exe C:\Users\Admin\AppData\Local\directory\word.exe autoit_exe -
Drops file in System32 directory 1 IoCs
Processes:
MStore.exedescription ioc process File created C:\Windows\SysWOW64\MService.exe MStore.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
word.exedescription pid process target process PID 2936 set thread context of 2868 2936 word.exe svchost.exe -
Drops file in Windows directory 2 IoCs
Processes:
Tester.exedescription ioc process File created C:\Windows\svchost.exe Tester.exe File opened for modification C:\Windows\svchost.exe Tester.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
u2b0.1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2b0.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2b0.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2b0.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
u2b0.0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u2b0.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u2b0.0.exe -
Processes:
New Text Document mod.exeMStore.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 New Text Document mod.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e New Text Document mod.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e New Text Document mod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 MStore.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 MStore.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 MStore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 MStore.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 040000000100000010000000497904b0eb8719ac47b0bc11519b74d00f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e MStore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 New Text Document mod.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 New Text Document mod.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
crypted6077866846MVYQY.exedisable-defender.exepowershell.exeu2b0.0.exeTester.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exepowershell.exepowershell.exesvchost.exepid process 364 crypted6077866846MVYQY.exe 960 disable-defender.exe 1888 powershell.exe 364 crypted6077866846MVYQY.exe 364 crypted6077866846MVYQY.exe 364 crypted6077866846MVYQY.exe 364 crypted6077866846MVYQY.exe 2644 u2b0.0.exe 364 crypted6077866846MVYQY.exe 364 crypted6077866846MVYQY.exe 364 crypted6077866846MVYQY.exe 2108 Tester.exe 2108 Tester.exe 2108 Tester.exe 2108 Tester.exe 2108 Tester.exe 2568 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2568 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2568 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2568 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2568 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1136 powershell.exe 2424 powershell.exe 768 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
word.exepid process 2936 word.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
New Text Document mod.execrypted6077866846MVYQY.exedisable-defender.exeresponsibilitylead.exepowershell.exeTester.exesvchost.exevssvc.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exepowershell.exepowershell.exesvchost.exedescription pid process Token: SeDebugPrivilege 2968 New Text Document mod.exe Token: SeDebugPrivilege 364 crypted6077866846MVYQY.exe Token: SeDebugPrivilege 960 disable-defender.exe Token: SeImpersonatePrivilege 960 disable-defender.exe Token: SeDebugPrivilege 600 responsibilitylead.exe Token: SeDebugPrivilege 1888 powershell.exe Token: SeDebugPrivilege 2108 Tester.exe Token: SeDebugPrivilege 1816 svchost.exe Token: SeBackupPrivilege 2724 vssvc.exe Token: SeRestorePrivilege 2724 vssvc.exe Token: SeAuditPrivilege 2724 vssvc.exe Token: SeDebugPrivilege 2568 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: SeDebugPrivilege 1136 powershell.exe Token: SeDebugPrivilege 2424 powershell.exe Token: SeDebugPrivilege 768 svchost.exe Token: SeDebugPrivilege 768 svchost.exe Token: SeDebugPrivilege 768 svchost.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
Processes:
wininit.exeword.exeu2b0.1.exepid process 2476 wininit.exe 2476 wininit.exe 2936 word.exe 2936 word.exe 1956 u2b0.1.exe 1956 u2b0.1.exe 1956 u2b0.1.exe 1956 u2b0.1.exe 1956 u2b0.1.exe 1956 u2b0.1.exe 1956 u2b0.1.exe -
Suspicious use of SendNotifyMessage 11 IoCs
Processes:
wininit.exeword.exeu2b0.1.exepid process 2476 wininit.exe 2476 wininit.exe 2936 word.exe 2936 word.exe 1956 u2b0.1.exe 1956 u2b0.1.exe 1956 u2b0.1.exe 1956 u2b0.1.exe 1956 u2b0.1.exe 1956 u2b0.1.exe 1956 u2b0.1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
svchost.exepid process 768 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
New Text Document mod.exepclient.exeMStore.execmd.exewininit.exeword.exeISetup8.exedescription pid process target process PID 2968 wrote to memory of 364 2968 New Text Document mod.exe crypted6077866846MVYQY.exe PID 2968 wrote to memory of 364 2968 New Text Document mod.exe crypted6077866846MVYQY.exe PID 2968 wrote to memory of 364 2968 New Text Document mod.exe crypted6077866846MVYQY.exe PID 2968 wrote to memory of 364 2968 New Text Document mod.exe crypted6077866846MVYQY.exe PID 2968 wrote to memory of 1512 2968 New Text Document mod.exe i1gcbW1E.exe PID 2968 wrote to memory of 1512 2968 New Text Document mod.exe i1gcbW1E.exe PID 2968 wrote to memory of 1512 2968 New Text Document mod.exe i1gcbW1E.exe PID 2968 wrote to memory of 960 2968 New Text Document mod.exe disable-defender.exe PID 2968 wrote to memory of 960 2968 New Text Document mod.exe disable-defender.exe PID 2968 wrote to memory of 960 2968 New Text Document mod.exe disable-defender.exe PID 2968 wrote to memory of 1636 2968 New Text Document mod.exe pclient.exe PID 2968 wrote to memory of 1636 2968 New Text Document mod.exe pclient.exe PID 2968 wrote to memory of 1636 2968 New Text Document mod.exe pclient.exe PID 1636 wrote to memory of 600 1636 pclient.exe responsibilitylead.exe PID 1636 wrote to memory of 600 1636 pclient.exe responsibilitylead.exe PID 1636 wrote to memory of 600 1636 pclient.exe responsibilitylead.exe PID 2968 wrote to memory of 1488 2968 New Text Document mod.exe MStore.exe PID 2968 wrote to memory of 1488 2968 New Text Document mod.exe MStore.exe PID 2968 wrote to memory of 1488 2968 New Text Document mod.exe MStore.exe PID 2968 wrote to memory of 1732 2968 New Text Document mod.exe Props.exe PID 2968 wrote to memory of 1732 2968 New Text Document mod.exe Props.exe PID 2968 wrote to memory of 1732 2968 New Text Document mod.exe Props.exe PID 1488 wrote to memory of 3040 1488 MStore.exe cmd.exe PID 1488 wrote to memory of 3040 1488 MStore.exe cmd.exe PID 1488 wrote to memory of 3040 1488 MStore.exe cmd.exe PID 3040 wrote to memory of 1888 3040 cmd.exe powershell.exe PID 3040 wrote to memory of 1888 3040 cmd.exe powershell.exe PID 3040 wrote to memory of 1888 3040 cmd.exe powershell.exe PID 2968 wrote to memory of 2476 2968 New Text Document mod.exe wininit.exe PID 2968 wrote to memory of 2476 2968 New Text Document mod.exe wininit.exe PID 2968 wrote to memory of 2476 2968 New Text Document mod.exe wininit.exe PID 2968 wrote to memory of 2476 2968 New Text Document mod.exe wininit.exe PID 2968 wrote to memory of 2764 2968 New Text Document mod.exe 1234.exe PID 2968 wrote to memory of 2764 2968 New Text Document mod.exe 1234.exe PID 2968 wrote to memory of 2764 2968 New Text Document mod.exe 1234.exe PID 2968 wrote to memory of 2764 2968 New Text Document mod.exe 1234.exe PID 2968 wrote to memory of 2988 2968 New Text Document mod.exe ISetup8.exe PID 2968 wrote to memory of 2988 2968 New Text Document mod.exe ISetup8.exe PID 2968 wrote to memory of 2988 2968 New Text Document mod.exe ISetup8.exe PID 2968 wrote to memory of 2988 2968 New Text Document mod.exe ISetup8.exe PID 2968 wrote to memory of 2988 2968 New Text Document mod.exe ISetup8.exe PID 2968 wrote to memory of 2988 2968 New Text Document mod.exe ISetup8.exe PID 2968 wrote to memory of 2988 2968 New Text Document mod.exe ISetup8.exe PID 2968 wrote to memory of 1916 2968 New Text Document mod.exe test2.exe PID 2968 wrote to memory of 1916 2968 New Text Document mod.exe test2.exe PID 2968 wrote to memory of 1916 2968 New Text Document mod.exe test2.exe PID 2476 wrote to memory of 2936 2476 wininit.exe word.exe PID 2476 wrote to memory of 2936 2476 wininit.exe word.exe PID 2476 wrote to memory of 2936 2476 wininit.exe word.exe PID 2476 wrote to memory of 2936 2476 wininit.exe word.exe PID 2936 wrote to memory of 2868 2936 word.exe svchost.exe PID 2936 wrote to memory of 2868 2936 word.exe svchost.exe PID 2936 wrote to memory of 2868 2936 word.exe svchost.exe PID 2936 wrote to memory of 2868 2936 word.exe svchost.exe PID 2936 wrote to memory of 2868 2936 word.exe svchost.exe PID 2988 wrote to memory of 2644 2988 ISetup8.exe u2b0.0.exe PID 2988 wrote to memory of 2644 2988 ISetup8.exe u2b0.0.exe PID 2988 wrote to memory of 2644 2988 ISetup8.exe u2b0.0.exe PID 2988 wrote to memory of 2644 2988 ISetup8.exe u2b0.0.exe PID 2988 wrote to memory of 1956 2988 ISetup8.exe u2b0.1.exe PID 2988 wrote to memory of 1956 2988 ISetup8.exe u2b0.1.exe PID 2988 wrote to memory of 1956 2988 ISetup8.exe u2b0.1.exe PID 2988 wrote to memory of 1956 2988 ISetup8.exe u2b0.1.exe PID 1488 wrote to memory of 2516 1488 MStore.exe MService.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"1⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\a\crypted6077866846MVYQY.exe"C:\Users\Admin\AppData\Local\Temp\a\crypted6077866846MVYQY.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:364 -
C:\Users\Admin\AppData\Local\Temp\a\i1gcbW1E.exe"C:\Users\Admin\AppData\Local\Temp\a\i1gcbW1E.exe"2⤵
- Executes dropped EXE
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\a\disable-defender.exe"C:\Users\Admin\AppData\Local\Temp\a\disable-defender.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:960 -
C:\Users\Admin\AppData\Local\Temp\a\pclient.exe"C:\Users\Admin\AppData\Local\Temp\a\pclient.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:600 -
C:\Users\Admin\AppData\Local\Temp\a\MStore.exe"C:\Users\Admin\AppData\Local\Temp\a\MStore.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell Add-MpPreference -ExclusionExtension .exe3⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionExtension .exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1888 -
C:\Windows\SysWOW64\MService.exe"C:\Windows\SysWOW64\MService.exe"3⤵
- Executes dropped EXE
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\a\Props.exe"C:\Users\Admin\AppData\Local\Temp\a\Props.exe"2⤵
- Executes dropped EXE
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\a\wininit.exe"C:\Users\Admin\AppData\Local\Temp\a\wininit.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\directory\word.exe"C:\Users\Admin\AppData\Local\Temp\a\wininit.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\a\wininit.exe"4⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\a\1234.exe"C:\Users\Admin\AppData\Local\Temp\a\1234.exe"2⤵
- Executes dropped EXE
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\a\ISetup8.exe"C:\Users\Admin\AppData\Local\Temp\a\ISetup8.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\u2b0.0.exe"C:\Users\Admin\AppData\Local\Temp\u2b0.0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\u2b0.1.exe"C:\Users\Admin\AppData\Local\Temp\u2b0.1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD14⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\a\test2.exe"C:\Users\Admin\AppData\Local\Temp\a\test2.exe"2⤵
- Executes dropped EXE
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\a\1111.exe"C:\Users\Admin\AppData\Local\Temp\a\1111.exe"2⤵
- Executes dropped EXE
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\a\ISetup2.exe"C:\Users\Admin\AppData\Local\Temp\a\ISetup2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\u1j4.0.exe"C:\Users\Admin\AppData\Local\Temp\u1j4.0.exe"3⤵
- Executes dropped EXE
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\a\Tester.exe"C:\Users\Admin\AppData\Local\Temp\a\Tester.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2108 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\svchost.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1136 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\a\svchost.exe"C:\Users\Admin\AppData\Local\Temp\a\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\a\555.exe"C:\Users\Admin\AppData\Local\Temp\a\555.exe"2⤵
- Executes dropped EXE
PID:1756
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
C:\Windows\system32\taskeng.exetaskeng.exe {D28C9D7C-9216-4747-9984-572BDA1CC814} S-1-5-21-778096762-2241304387-192235952-1000:AYFLYVMK\Admin:Interactive:[1]1⤵PID:2668
-
C:\Windows\svchost.exeC:\Windows\svchost.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:768
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbfce7b0440c50f6509395c0a8e15b7a
SHA1296732b22b6c9d06778f63a1948d5742a07fd8be
SHA25653b97b1c33e9e1f32d8380f2129d6ad2fb60705ca4cbaf5bcf4e07ca0efa3d45
SHA512ca7854397bba008e5c8a5bfd5cd0da93fdbcf27f7c05d302a9b7ad22bd576af369672318fd296396c9583341d1b63e0f3a4d6c761bb9e1e4e19901db068f8663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5032f083f61bcad3cd8f878c1a84d483c
SHA1997c42fd3a620611b00a2a1f9629ed82d05d39b4
SHA256ed4e615628b057dca1e0161fc09b2142cdf5b19ecbd01f15821aacaec5f039ba
SHA5122993718cee73ae1eac7eb9b8c208193961bf0c6b5622256e27ccf105e7e8dc1aa28a586be33aee6d1659acb185d1f8cc544e35ac49c5c6bbcea08abd13536e1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519d2b2521ae9c07d363f151d83cfd6f2
SHA1dfa98d284011aef639cd2d5fd3c3f4e3396bcd3c
SHA256f10efd1e571096e55dec6b7f73471e252b6d332e67e8a5031fd64abaa1950c98
SHA5126c38e716c33e51fccec56b260b080b8cceb973c14655247c8910d0c239a7c573e51266ca420639d7b5e625ee494ae602a4dfb1022096c3056f442e5cf5e7b912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec0a6a1b0dbe41da1761724138beb395
SHA1336e5800a329b8299c7017db9cafbd7f0d1f0180
SHA256830852d9ad2f594aeb73d334a87f38dbb24eaab8182b6b9ee900db681414fb35
SHA512d4261f8e376818605a206913616c21fa58bcc5973d4bedad2b56d884e0dca9d2420d45c6776457ab702dded90116b8243b5ea279f61c40aca4774d8d3ef79c5d
-
C:\Users\Admin\AppData\Local\Microsoft\ApplicationInsights\04bd6d19510dd013cd80eba12152cc40d6b5fb5036cdd77d994a3ba1ca666749\41cd63e6c7f843358510832a62c8dbbb.tmp
Filesize1KB
MD536da7874c7dc56192a1e0f499bdd2665
SHA1aa95bd34ae413626bb1e4717f7981e12c8e01534
SHA2567e94f3b298bd3306d41adc53ac7a96770677c51f058a252e7ec6d9427e5f9e0a
SHA5124fe845433ecc6f9c426ea46b00ffa33c0eff67b5bdb724d7a4750d82c7993206e7a5497461504d5fd7ad2c928a95b24d1609125fa8bebc163da6d2d736b6bda3
-
Filesize
6KB
MD5f7930c4859ccd34bd2b80a9995f49926
SHA18b5b95fb51619e20246f90d60f2137da7654fc5e
SHA256163969ebee8180e125eb00c02307adda1eb31174ba6f7e011b7b4b3441d8950a
SHA5128f5a440541b227083f3d2a3a251758bf699a290db3c066ae3209d4c2df5e1e933b9c24cd4c0da0a7f3cb6ca0ce025acf22f65cc06ee1e306ecb9b1318a223a43
-
Filesize
29KB
MD51680954b249062aa27483ac80d9d2016
SHA1acb196e38638fa7332a450b8ed9c127f1d56acff
SHA2563614592179f15f4bc0cba05bac8e9dd7e545e6f623bd71b841aaa665f82b16cb
SHA5129c94ec10f0577953a6bbc994b1339d9e414622efd07e4a61f31c5213f588d7327bd772c225a7a127736b721ec026ff836cf4167f9467dbf6df819bdec6e2ed93
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
1.3MB
MD55e13199a94cf8664e5bfbe2f68d4738e
SHA18cfaa21f68226ae775615f033507b5756f5ccacc
SHA25671b320a5d9456acc43494213dcd1f4ae8b7f6e27a15ac80cb42df5f19f692ec5
SHA512b7b682717cd49b9fff9885c85f1421050613559308aa7160dee7ce493d5bff126c8157727d8f88fdfd602092203c64ab0dbff718b7ce7af9f9f2ad8375d703b5
-
Filesize
2.7MB
MD57162024dc024bb3311ee1cf81f37a791
SHA1be03705f33a8205f90330814f525e2e53dfb5871
SHA2563e39efae22fcda501f858229af27be129f178c85723d4477ef9be2f80b61a8fd
SHA51294652b8b770fcdd70ee5059b56ce84aee50c46901b6311e2a602cdb4d97b15abd0148ba4e55f225f722d125bf9c3969185bcefaf07f3911a4347d9a0ca8d2d38
-
Filesize
413KB
MD5d388d6918f1e8a6a3b34ad993d8159eb
SHA1cf3cd31a4dd6571cc78016c7b0f97f621b1f253d
SHA25627d2a005efcb4da7da558eaafb6bc955a008c4beb5814d262cee38cf379f7645
SHA51254cdbb862536ce1deffc37c5a185e85e52ea1b69bb4c8e0e9137e4d34787ad4b66b047a90b1dbe6694b1d41233e947ffa7119f08e01616f472daf3f72e35761e
-
Filesize
413KB
MD594e9960a45131af61e599acee54d21d6
SHA139b03e050337d4eb127ae5ff5f0868e986bec7ad
SHA2567add2d9d67534037b7ae6e8d1682595f5bc45cd71f6bcc933994f53f5ff00172
SHA512179f713f0ce01a70b176373d042538f95a1653cf364510b7f35d3d46a7fee2d295c6e24755d2a1363e5ca82494caec8252dd94bcd31c7a015ef5640636f7e81a
-
Filesize
12KB
MD5282c1ebb16ad0edc41389d1e73a74607
SHA1fbcdda121484ea6125827ed4e7b1b00f6a88835d
SHA2567712424f2dec2d08630237c737e5f81789d2e92edc31111c72eaa0388b6df1dc
SHA51294be4f173c5c63947a6e7902a86c8851ee84a06d1ddec104af91592178adafc3180f652791badc3e0c1139bbc7c9f64b9e47ccd0adadd16159a40ab6c188b292
-
Filesize
7KB
MD59c938f91a0530150a2b1c4546334570c
SHA1f4ae9acba920744457739fef0205f86443dbdf65
SHA25635a6319c334d545be1aff625c27d51d583762b44c77f172f532c27021459345a
SHA512f5b8fa5f95011fe6677f2f751b5364745607a027e49de05d2a11a5bea5040c97b6cb4285007ee34ce05b00217dd9665065b276df21bf37f823691f57ad2a6a0b
-
Filesize
267KB
MD50803c1aec008e75859877844cfa81492
SHA116924d5802ddf76a2096fcfade0ce06d4c0670bd
SHA256d5ab98bd209db0ed18272fe616ea4b8be34fd13d36116d25793fa7aa6f8b33e3
SHA5129001e77da2562652ae51bdb3b8b9bfe686d0ed0c4eb8d338b20b7c4eb6eb8e90a4fae01d8212b1908037d5ff456e982500e4907686c38e5c33e969d55ba914d9
-
Filesize
524KB
MD5c8edf453ed433cefb2696bb859e0f782
SHA1e34cf939d6c5a34c7bedfd885249bb7fb15336e5
SHA2560c5c2b10c3161ad9452c25d4a10e082ec94f0eb39b583c03ab3534a5e45649a0
SHA51261d0ba50f9678d6614e4d8ab8b06d759891979e0debfda88246871ee110a07c16ceeed4e7baec475b4b63de851bc5d62c69c5ae41674ffc207b94515f6ab197c
-
Filesize
66KB
MD500135a86ab829fc2d4678179d7a6e70f
SHA1ef75c259865d7685d566b6e25b7a20d134952555
SHA2560b8b21af69d0b465b7b8cd584bdba1f86d062bb0c7c51656f36a66fce8e9bd89
SHA512011389f2bc93f45b36233238a32991823c3334e3259af98e7dd6cedb455fc930d5b603f51bb69e415ab24f285309eda0b272250f1ec82a21508de0681281a0ef
-
Filesize
1.3MB
MD5ddee86f4db0d3b8010110445b0545526
SHA1b41380b50d17dd679f85a224771398b81966bb9e
SHA2560d1277800ce70608ae6223a3361f709c7c68743178ca51fe3a2409a610c76de5
SHA5124271e530a7090d58e41adc441eed6aacd6238d4e562cbab05bf273549e15a22dda668450746eda64e2435d480dc46531a29de3ba797a235a9c1a411a1f8f3710
-
Filesize
128KB
MD5c840ab9838ec2feaaa30a7b04dfaabe5
SHA1b5b543cccb2cfaaf4a8bed4c9a468e1f26277152
SHA2561ed9c30f962934f16a9a8a7cff1087dc4a5e8842b6079b9c99f107e00feb8445
SHA51266f62ac8a031bc4f2d813b80ae753c4bd67ab67fdb81ca0fcba46f66e7c33c82653f6f6b121ed29f446af045dbba0d70394173c68c52dbe7aa51eb735ad51c48
-
Filesize
2KB
MD52746012bbf2f5941f0ce037d3acb1123
SHA12b73f2e63be532718752dcc6a1e7a57b805fb95e
SHA256e1194823bef56917a107bef7163c7301d6553ab50d4a54bdaff5c89a3e72ce7d
SHA5128162f6db5a7bf03870b42d2e5dbdbc61bbfe8efc8df06023b217f8a17a6d117c3b14544028971c2f4cab5c5104ca0bdef9735c81af808aa17923f54caca6bd85
-
Filesize
3KB
MD5907566088750dc28543b6e528075c26d
SHA1b363f9d4c005e94e9edc363c5f97bd2a55cb0115
SHA256576e697f681a157067cbe402d8828d562be32222f85daa45cf5c9bcbead46762
SHA51241d5d47158213b6f5e06bfeddc3b2c40e06ae5e9e922833b0ef9a6c8ee72f90889394fdd2797b464eeea1a3e98dea7b6c02a0a0a00d16368cde55b32971ff9f2
-
Filesize
102.3MB
MD524ec65cce2e627b3895975ec3179cd3e
SHA113e9e5702e7c0d5961d65bb377c7e1868f35da34
SHA2569dad178f94d740f7fde77ce253fd69a1e284d1de957acc72e905273ea371252f
SHA512b7dcb90918a23526ca10bca3e68cfcd2e8e4203c669d25be2228fa7cb493c3f27eb1773e38c9151c1a92362d8dcf1242ebe8fc7e0fa11ea0116bb31de8cfddc7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\U6WF5AMQBOQ4IOL3IMVU.temp
Filesize7KB
MD58e56674bfbbbf36690fc10aff576eee6
SHA1b08a5980e903c946ab8abe3c62ece1403a86633e
SHA25635898c3312f74822e6df3f4a0b0428443218879c97036cc6d0734fe16454f327
SHA5121f987dc4714cf4a37ca4123a894cbd90ac1a72ba6cb40a3c00355b6ceed584351e5c4f6659c231ba3d1f9cbbcd59ff1a262e9ac9c76ef3dfc85f07c468517d69
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2.8MB
MD5e670bdc7c82eee75a6d3ada6a7c9134e
SHA1b0f0bab6f6e92bc86e86fd7bff93c257a4235859
SHA256a5cf4844df86abc9222fe436dbc0726e09383a61f4708cdc1a3e8a89cc3540fb
SHA5127384550bb19ccc11243b79d3bfc9c3f25dce84de64891e7f7eb078b246bfedcd26a958a019a3a7b4ecf5ee1c4e8c8d44790f5c958a58266e5676f3a8e58f4643
-
Filesize
294KB
MD510fc8b2915c43aa16b6a2e2b4529adc5
SHA10c15286457963eb86d61d83642870a3473ef38fe
SHA256feb09cc39b1520d228e9e9274500b8c229016d6fc8018a2bf19aa9d3601492c5
SHA512421631c06408c3be522953459228d2e1d45eeeafce29dba7746c8485a105b59c3a2c0d9e2ffc6d89126cd825ffd09ebe7eb82223a69d1f5caf441feb01e57897
-
Filesize
2.3MB
MD5262a7eb58a01d1aab21b24292c181cd3
SHA1535312b7048fb90be981e04ea759c5ad8aaf6eda
SHA256107090a44888272297ecb7a715a9abca4bc17dafe6aa57505436722a5a9926a6
SHA512358b34a792eadc739446283e42a352147aac1bad6d9a535eedabeb2427735b03e7977d25086cfa6b6e8e17df628e37d9a8cd584dd1a64d703e99a8f7af1a0e9b
-
Filesize
157KB
MD55790d1417f8f00bd7ec6fb7011c79d9c
SHA136076ed9457c45d94e664ea291eb01e5c70d084b
SHA256ad07503bc046f5b3d65eb61646fa826bc39560916c6e1ef2c3437b6465b30a82
SHA512b19195510624ad16a4730282c97b68d05e4890a33d91f86f24eaf921e23e7786649e4e31aaaec2d9d6c7bb3695c615851d7aed3e53b13083e03acbc8d0543ef0
-
Filesize
2.7MB
MD55347852b24409aed42423f0118637f03
SHA16c7947428231ab857ee8c9dab7a7e62fdeed024b
SHA256a2e678bb376d2dcec5b7d0abac428c87cd8ae75936e28c03cb4232ae97015131
SHA5120a52f226be962eb8187f444657317d3e0385d9d47d507e6f1c028143f57153a7b8e34ef7b0c8732bb3b3d361da483a13264f511ca5c80cedda3bc439fe936991
-
Filesize
271KB
MD5b95747cad90e982d44da8fd74f50b9a6
SHA1d7f267d2042f6b67f63542395ff6a5a1b3ba1250
SHA2567b4d39265da2ddc442c1bc4335c92fe527bf6b8d644d4d465f1476a97a1fb153
SHA512615d35780262f55313ccbe31e323bb6ba9787120ce06d5236a74844736543c7551e4e227e350bf1604208095165c42564234bb2dafe575785008683ae4e5393c
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954